vulnerability
Oracle Linux: CVE-2018-4180: ELSA-2020-1050: cups security and bug fix update (MODERATE) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:M/C:C/I:C/A:C) | 2018-05-09 | 2022-10-05 | 2024-11-27 |
Severity
6
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
2018-05-09
Added
2022-10-05
Modified
2024-11-27
Description
In macOS High Sierra before 10.13.5, an issue existed in CUPS. This issue was addressed with improved access restrictions.
It was discovered that CUPS allows non-root users to pass environment variables to CUPS backends. Affected backends use attacker-controlled environment variables without proper sanitization. A local attacker, who is part of one of the groups specified in the SystemGroups directive, could use the cupsctl binary to set SetEnv and PassEnv directives and potentially controls the flow of the affected backend, resulting in some cases in arbitrary code execution with root privileges.
It was discovered that CUPS allows non-root users to pass environment variables to CUPS backends. Affected backends use attacker-controlled environment variables without proper sanitization. A local attacker, who is part of one of the groups specified in the SystemGroups directive, could use the cupsctl binary to set SetEnv and PassEnv directives and potentially controls the flow of the affected backend, resulting in some cases in arbitrary code execution with root privileges.
Solution(s)
oracle-linux-upgrade-cupsoracle-linux-upgrade-cups-clientoracle-linux-upgrade-cups-develoracle-linux-upgrade-cups-filesystemoracle-linux-upgrade-cups-ipptooloracle-linux-upgrade-cups-libsoracle-linux-upgrade-cups-lpd

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.