ESB-2018.2058 - [Debian] cups: Multiple vulnerabilities 2018-07-16

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.2058
                           cups security update
                               16 July 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           cups
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
Impact/Access:     Increased Privileges     -- Existing Account
                   Access Confidential Data -- Existing Account
                   Reduced Security         -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6553 CVE-2018-4181 CVE-2018-4180

Reference:         ESB-2018.2025
                   ESB-2018.2021

Original Bulletin: 
   https://security-tracker.debian.org/tracker/DLA-1426-1

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : cups
Version        : 1.7.5-11+deb8u4
CVE ID         : CVE-2018-4180 CVE-2018-4181 CVE-2018-6553

Several vulnerabilities were discovered in CUPS, the Common UNIX Printing
System. These issues have been identified with the following CVE ids:

CVE-2018-4180

     Dan Bastone of Gotham Digital Science discovered that a local
     attacker with access to cupsctl could escalate privileges by setting
     an environment variable.

CVE-2018-4181

     Eric Rafaloff and John Dunlap of Gotham Digital Science discovered
     that a local attacker can perform limited reads of arbitrary files
     as root by manipulating cupsd.conf.

CVE-2018-6553

    Dan Bastone of Gotham Digital Science discovered that an attacker
    can bypass the AppArmor cupsd sandbox by invoking the dnssd backend
    using an alternate name that has been hard linked to dnssd.

For Debian 8 "Jessie", these problems have been fixed in version
1.7.5-11+deb8u4.

We recommend that you upgrade your cups packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=w8fx
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=XJ40
-----END PGP SIGNATURE-----

« Back to bulletins