SB2019081528 - Gentoo update for CUPS



SB2019081528 - Gentoo update for CUPS

Published: August 15, 2019 Updated: August 25, 2019

Security Bulletin ID SB2019081528
Severity
Low
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Command injection (CVE-ID: CVE-2017-15400)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to command injection. A remote unauthenticated attacker can set a malicious IPP server with a crafted PPD file, inject and execute arbitrary commands with the privilege of the CUPS daemon.


2) Privilege escalation (CVE-ID: CVE-2018-4180)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to unspecified flaw. A local attacker with access to cupsctl can set an environment variable and gain elevated privileges.


3) Information disclosure (CVE-ID: CVE-2018-4181)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to unspecified flaw. A local attacker can manipulate cupsd.conf and read arbitrary files with root privileges.


4) Security restrictions bypass (CVE-ID: CVE-2018-4182)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to an error in CUPS' profile creation. A remote attacker with sandboxed root access can bypass security restrictions and execute backends without a sandbox profile.


5) Command injection (CVE-ID: CVE-2018-4183)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists due to command injection. A remote attacker with sandboxed root access can modify /etc/cups/cups-files.conf, inject and execute arbitrary commands as unsandboxed root.


6) Security restrictions bypass (CVE-ID: CVE-2018-6553)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The vulnerability exists due to unspecified flaw. A remote attacker can invoke the dnssd backend using an alternate name that has been hard linked to dnssd and bypass the AppArmor cupsd sandbox


Remediation

Install update from vendor's website.