发布时间 :2005-01-10 00:00:00
修订时间 :2017-10-10 21:29:43

[原文]lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.

[CNNVD]CUPS lppasswd 弱安全机制漏洞(CNNVD-200501-083)

        CUPS(Common UNIX Printing System)是一个类Unix操作系统的组合式印刷系统,允许一台电脑作为打印服务器。
        CUPS 1.1.22中的lppasswd在修改CUPS密码文件时会忽略写入错误,使得可本地用户通过填充相关联的文件系统来触发写错误,从而对密码文件造成损坏。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10398lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling th...

- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  XF  cups-lppasswd-passwd-truncate(18606)

- 漏洞信息

CUPS lppasswd 弱安全机制漏洞
低危 其他
2005-01-10 00:00:00 2005-10-20 00:00:00
        CUPS(Common UNIX Printing System)是一个类Unix操作系统的组合式印刷系统,允许一台电脑作为打印服务器。
        CUPS 1.1.22中的lppasswd在修改CUPS密码文件时会忽略写入错误,使得可本地用户通过填充相关联的文件系统来触发写错误,从而对密码文件造成损坏。

- 公告与补丁


- 漏洞信息

CUPS lppasswd File Limit DoS
Denial of Service
Loss of Availability

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-12-16 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Easy Software Products LPPassWd CUPS Password File Error Message Injection Vulnerability
Failure to Handle Exceptional Conditions 12007
No Yes
2004-12-15 12:00:00 2009-07-12 09:26:00
Discovery is credited to Bartlomiej Sieka.

- 受影响的程序版本

SGI ProPack 3.0
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux 8.1
S.u.S.E. Linux 8.0 i386
S.u.S.E. Linux 8.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 3
RedHat Desktop 3.0
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 3
Gentoo Linux
Easy Software Products lppasswd 1.1.22
Easy Software Products CUPS 1.1.22 rc1
Easy Software Products CUPS 1.1.20
+ ALT Linux ALT Linux Compact 2.3
+ ALT Linux ALT Linux Junior 2.3
+ Gentoo Linux 1.4 _rc3
+ Gentoo Linux 1.4 _rc2
+ Gentoo Linux 1.4 _rc1
+ MandrakeSoft apcupsd 2006.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ S.u.S.E. Linux Personal 9.1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32

- 漏洞讨论

Easy Software Products lppasswd is prone to a vulnerability that may allow malicious local users to inject arbitrary data into the CUPS password file.

This issue can occur on systems that do not ensure that the stdin, stdout, and stderr file descriptors are always open for setuid programs. If a user closes the stderr file descriptor, it is possible that a user-specified error message may be written to the CUPS password file.

This may permit a local attacker to add an arbitrary user to the CUPS password file.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 解决方案

RedHat has released advisories FEDORA-2004-559, and FEDORA-2004-560 to address this issue and other issues in Fedora Core 2 and 3. Please see the referenced advisories for further information.

Ubuntu has released an advisory (USN-50-1) addressing this issue. Please see the referenced advisory for more information.

Gentoo has released an advisory GLSA 200412-25 to address various issues in CUPS. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to update their computers:

emerge --sync
emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23_rc1"

Gentoo has released an updated version of their CUPS advisory (GLSA 200412-25). Due to a recently discovered denial of service vulnerability, Gentoo advises that all CUPS users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23"

For more information please see the referenced Gentoo advisory (GLSA 200412-25).

Red Hat has released an advisory (RHSA-2005:013-20) to address various issues in CUPS. Please see the advisory in Web references for more information.

Mandrake has released advisory MDKSA-2005:008 to address various issues related to CUPS. Please see the referenced advisory for more information.

SGI has released advisory 20050101-01-U (SGI Advanced Linux Environment 3 Security Update #23) to address various issues in SGI Advanced Linux Environment 3. This advisory includes updated SGI ProPack 3 Service Pack 3 packages and patch 10137. Please see the referenced advisory for more information.

SuSE Linux has released a security summary report (SUSE-SR:2005:003) that contains fixes to address this and other vulnerabilities. Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates.

TurboLinux has released Security Announcement 17/Feb/2005 dealing with this and other issues; please see the reference section for more information.

Fedora has released Fedora Legacy Advisory (FLSA:2127) to address various issues affecting CUPS in Red Hat Linux 7.3, Red Hat Linux 9, and Fedora Core 1 for the i386 architecture. Please see the referenced advisory for more information.

Easy Software Products CUPS 1.1.20

Easy Software Products CUPS 1.1.22 rc1

SGI ProPack 3.0

- 相关参考