lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://advisories.mageia.org/MGASA-2014-0021.html | |
http://www.cups.org/blog.php?L704 | |
http://www.ubuntu.com/usn/USN-2082-1 | vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:015 | vendor advisory |
http://secunia.com/advisories/56531 | third party advisory vendor advisory |
http://www.cups.org/str.php?L4319 | patch exploit |