Lucene search

K
ubuntuUbuntuUSN-6844-1
HistoryJun 24, 2024 - 12:00 a.m.

CUPS vulnerability

2024-06-2400:00:00
ubuntu.com
49
ubuntu 24.04 lts
ubuntu 23.10
ubuntu 22.04 lts
ubuntu 20.04 lts
ubuntu 18.04 esm
ubuntu 16.04 esm
cups
arbitrary chmod
world-writable access
cupsd server

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

7.4

Confidence

Low

Releases

  • Ubuntu 24.04 LTS
  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM

Packages

  • cups - Common UNIX Printing System™

Details

Rory McNamara discovered that when starting the cupsd server with a
Listen configuration item, the cupsd process fails to validate if
bind call passed. An attacker could possibly trick cupsd to perform
an arbitrary chmod of the provided argument, providing world-writable
access to the target.

OSVersionArchitecturePackageVersionFilename
Ubuntu24.04noarchcups< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-bsd< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-bsd-dbgsym< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-client< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-client-dbgsym< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-common< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-core-drivers< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-core-drivers-dbgsym< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-daemon< 2.4.7-1.2ubuntu7.1UNKNOWN
Ubuntu24.04noarchcups-daemon-dbgsym< 2.4.7-1.2ubuntu7.1UNKNOWN
Rows per page:
1-10 of 1551

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

7.4

Confidence

Low