SB2018080804 - OpenSUSE Linux update for cups
Published: August 8, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2017-18248)
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.The weakness exists in the add_job function due to insufficient validation of usernames. A remote attacker can send print jobs with an invalid username and cause the service to crash.
2) Privilege escalation (CVE-ID: CVE-2018-4180)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to unspecified flaw. A local attacker with access to cupsctl can set an environment variable and gain elevated privileges.
3) Information disclosure (CVE-ID: CVE-2018-4181)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.
The vulnerability exists due to unspecified flaw. A local attacker can manipulate cupsd.conf and read arbitrary files with root privileges.
4) Security restrictions bypass (CVE-ID: CVE-2018-4182)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to an error in CUPS' profile creation. A remote attacker with sandboxed root access can bypass security restrictions and execute backends without a sandbox profile.
5) Command injection (CVE-ID: CVE-2018-4183)
The vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists due to command injection. A remote attacker with sandboxed root access can modify /etc/cups/cups-files.conf, inject and execute arbitrary commands as unsandboxed root.
Remediation
Install update from vendor's website.