The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Apple CUPS

computer vulnerability announce CVE-2018-6553

CUPS: privilege escalation via AppArmor Dnssd

Synthesis of the vulnerability

An attacker can bypass restrictions via AppArmor Dnssd of CUPS, in order to escalate his privileges.
Impacted products: CUPS, Debian, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 12/07/2018.
Identifiers: CVE-2018-6553, DLA-1426-1, DSA-4243-1, USN-3713-1, VIGILANCE-VUL-26697.

Description of the vulnerability

An attacker can bypass restrictions via AppArmor Dnssd of CUPS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-4183

CUPS: code execution via /etc/cups/cups-files.conf

Synthesis of the vulnerability

An attacker can use a vulnerability via /etc/cups/cups-files.conf of CUPS, in order to run code.
Impacted products: CUPS, Debian, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: user shell.
Creation date: 12/07/2018.
Identifiers: CVE-2018-4183, DSA-4243-1, openSUSE-SU-2018:2239-1, openSUSE-SU-2018:2292-1, SUSE-SU-2018:2162-1, SUSE-SU-2018:2172-1, SUSE-SU-2018:2233-1, VIGILANCE-VUL-26696.

Description of the vulnerability

An attacker can use a vulnerability via /etc/cups/cups-files.conf of CUPS, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-4182

CUPS: privilege escalation via Profile Creation Error

Synthesis of the vulnerability

An attacker can bypass restrictions via Profile Creation Error of CUPS, in order to escalate his privileges.
Impacted products: CUPS, Debian, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 12/07/2018.
Identifiers: CVE-2018-4182, DSA-4243-1, openSUSE-SU-2018:2239-1, openSUSE-SU-2018:2292-1, SUSE-SU-2018:2162-1, SUSE-SU-2018:2172-1, SUSE-SU-2018:2233-1, VIGILANCE-VUL-26695.

Description of the vulnerability

An attacker can bypass restrictions via Profile Creation Error of CUPS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-4181

CUPS: file reading via cupsd.conf

Synthesis of the vulnerability

A local attacker can read a file via cupsd.conf of CUPS, in order to obtain sensitive information.
Impacted products: CUPS, Debian, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 12/07/2018.
Identifiers: CVE-2018-4181, DLA-1426-1, DSA-4243-1, openSUSE-SU-2018:2239-1, openSUSE-SU-2018:2292-1, SUSE-SU-2018:2162-1, SUSE-SU-2018:2172-1, SUSE-SU-2018:2233-1, USN-3713-1, VIGILANCE-VUL-26694.

Description of the vulnerability

A local attacker can read a file via cupsd.conf of CUPS, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-4180

CUPS: privilege escalation via CUPS_SERVERBIN

Synthesis of the vulnerability

An attacker can bypass restrictions via CUPS_SERVERBIN of CUPS, in order to escalate his privileges.
Impacted products: CUPS, Debian, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 12/07/2018.
Identifiers: CVE-2018-4180, DLA-1426-1, DSA-4243-1, openSUSE-SU-2018:2239-1, openSUSE-SU-2018:2292-1, SUSE-SU-2018:2162-1, SUSE-SU-2018:2172-1, SUSE-SU-2018:2233-1, USN-3713-1, VIGILANCE-VUL-26693.

Description of the vulnerability

An attacker can bypass restrictions via CUPS_SERVERBIN of CUPS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-15400

CUPS: code execution via IPP Filters

Synthesis of the vulnerability

An attacker can use a vulnerability via IPP Filters of CUPS, in order to run code.
Impacted products: CUPS, Debian.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet client.
Creation date: 11/07/2018.
Identifiers: CVE-2017-15400, DSA-4243-1, VIGILANCE-VUL-26691.

Description of the vulnerability

An attacker can use a vulnerability via IPP Filters of CUPS, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2017-18248

CUPS: denial of service via Invalid UTF-8 Username

Synthesis of the vulnerability

An attacker can generate a fatal error via Invalid UTF-8 Username of CUPS, in order to trigger a denial of service.
Impacted products: CUPS, Debian, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 27/03/2018.
Identifiers: 5143, CVE-2017-18248, DLA-1387-1, DLA-1412-1, openSUSE-SU-2018:2239-1, SUSE-SU-2018:2162-1, USN-3713-1, VIGILANCE-VUL-25658.

Description of the vulnerability

An attacker can generate a fatal error via Invalid UTF-8 Username of CUPS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-3258 CVE-2015-3279

CUPS: buffer overflow of texttopdf

Synthesis of the vulnerability

An attacker can generate a buffer overflow in texttopdf of CUPS, in order to trigger a denial of service, and possibly to execute code.
Impacted products: CUPS, Debian, Fedora, openSUSE, RHEL, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, denial of service on server, denial of service on service.
Provenance: user account.
Number of vulnerabilities in this bulletin: 2.
Creation date: 29/06/2015.
Identifiers: 1235385, CVE-2015-3258, CVE-2015-3279, DSA-3303-1, FEDORA-2015-11163, FEDORA-2015-11192, openSUSE-SU-2015:1244-1, RHSA-2015:2360-01, USN-2659-1, VIGILANCE-VUL-17249.

Description of the vulnerability

The CUPS product includes a tool to convert raw text to PDF.

When generating the PDF header, in the function "WriteProlog", a buffer size is computed from the number of lines and columns of text. However, if the specified size is too small, an invalid buffer size is used and an overflow will happen when generating pages.

An attacker can therefore generate a buffer overflow in texttopdf of CUPS, in order to trigger a denial of service, and possibly to execute code.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce 17082

CUPS: endless loop in the handling of compressed files

Synthesis of the vulnerability

An attacker can generate an infinite loop in the handling of compressed files in CUPS, in order to trigger a denial of service.
Impacted products: CUPS.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: user shell.
Creation date: 09/06/2015.
Identifiers: 4602, VIGILANCE-VUL-17082.

Description of the vulnerability

CUPS us a printing management system for Unix platforms.

It can receive file to be printed in Gzip compressed form. However, the Gzip format is not well checked and one kind of ill formed file leads to an endless loop.

An attacker can therefore generate an infinite loop in the handling of compressed files in CUPS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2015-1158

CUPS: privilege escalation via the dynamic linker

Synthesis of the vulnerability

An attacker can bypass access restrictions to administrative functions of CUPS, in order to escalate his privileges.
Impacted products: CUPS, Debian, Fedora, Junos Space, openSUSE, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: user shell.
Creation date: 08/06/2015.
Revision date: 09/06/2015.
Identifiers: 4609, CERTFR-2015-AVI-431, CVE-2015-1158, DSA-3283-1, FEDORA-2015-9726, FEDORA-2015-9801, JSA10702, openSUSE-SU-2015:1056-1, RHSA-2015:1123-01, SSA:2015-188-01, SUSE-SU-2015:1011-1, SUSE-SU-2015:1041-1, SUSE-SU-2015:1044-1, SUSE-SU-2015:1044-2, USN-2629-1, VIGILANCE-VUL-17079, VU#810572.

Description of the vulnerability

CUPS us a printing management system for Unix platforms.

It includes a Web interface, used for instance to submit print jobs. However, ill formed requests with more than one "nameWithLanguage" attributes lead to the ability to override a configuration file. This allows the attacker to modify the environment of launched programs with SetEnv commands, and so, via LD_PRELOAD variables, to make launched programs load and run external code compiled as shared object.

An attacker can therefore bypass access restrictions to administrative functions of CUPS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Apple CUPS: