Lucene search

K
mageiaGentoo FoundationMGASA-2024-0227
HistoryJun 17, 2024 - 8:44 p.m.

Updated cups packages fix security vulnerability

2024-06-1720:44:07
Gentoo Foundation
advisories.mageia.org
20
cups packages
security vulnerability
chmod
world-writable access
unix

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

7

Confidence

Low

EPSS

0

Percentile

5.2%

When starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchcups< 2.4.6-1.2cups-2.4.6-1.2.mga9

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

7

Confidence

Low

EPSS

0

Percentile

5.2%