CVE-2004-1270
CVSS2.1
发布时间 :2005-01-10 00:00:00
修订时间 :2010-08-21 00:22:08
NMCOS    

[原文]lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.


[CNNVD]CUPS lppasswd 弱安全机制漏洞(CNNVD-200501-028)

        CUPS(Common UNIX Printing System)是一个类Unix操作系统的组合式印刷系统,允许一台电脑作为打印服务器。
        CUPS 1.1.22中的llpaswd程序存在漏洞。
        在当lppassw无法确保文件描述符0, 1, 和 2 打开的环境中运行时,lppasswd不会核实passwd.new文件不同于STDERR。这使得本地用户可以借助特定用户输入,触发错误,从而控制passwd.new的输出。

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:easy_software_products:cups:1.1.6
cpe:/a:easy_software_products:cups:1.0.4_8
cpe:/a:easy_software_products:cups:1.1.12
cpe:/a:easy_software_products:cups:1.1.4_5
cpe:/a:easy_software_products:cups:1.1.19_rc5
cpe:/o:redhat:fedora_core:core_3.0
cpe:/a:easy_software_products:cups:1.1.21
cpe:/a:easy_software_products:cups:1.1.14
cpe:/a:easy_software_products:cups:1.1.18
cpe:/a:easy_software_products:cups:1.1.7
cpe:/a:easy_software_products:cups:1.1.13
cpe:/a:easy_software_products:cups:1.1.4_3
cpe:/a:easy_software_products:cups:1.1.22_rc1
cpe:/a:easy_software_products:cups:1.1.20
cpe:/o:redhat:fedora_core:core_2.0
cpe:/a:easy_software_products:cups:1.1.4_2
cpe:/a:easy_software_products:cups:1.1.4
cpe:/a:easy_software_products:cups:1.1.15
cpe:/a:easy_software_products:cups:1.1.16
cpe:/a:easy_software_products:cups:1.1.17
cpe:/a:easy_software_products:cups:1.1.10
cpe:/a:easy_software_products:cups:1.1.1
cpe:/a:easy_software_products:cups:1.1.19
cpe:/a:easy_software_products:cups:1.0.4

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11507lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, doe...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1270
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1270
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200501-028
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/18609
(UNKNOWN)  XF  cups-lppasswd-passwd-modify(18609)
http://www.redhat.com/support/errata/RHSA-2005-053.html
(UNKNOWN)  REDHAT  RHSA-2005:053
http://www.redhat.com/support/errata/RHSA-2005-013.html
(UNKNOWN)  REDHAT  RHSA-2005:013
http://tigger.uic.edu/~jlongs2/holes/cups2.txt
(VENDOR_ADVISORY)  MISC  http://tigger.uic.edu/~jlongs2/holes/cups2.txt
http://www.ubuntulinux.org/support/documentation/usn/usn-50-1
(UNKNOWN)  UBUNTU  USN-50-1
http://www.mandriva.com/security/advisories?name=MDKSA-2005:008
(UNKNOWN)  MANDRAKE  MDKSA-2005:008
http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml
(UNKNOWN)  GENTOO  GLSA-200412-25

- 漏洞信息

CUPS lppasswd 弱安全机制漏洞
低危 其他
2005-01-10 00:00:00 2005-10-20 00:00:00
本地  
        CUPS(Common UNIX Printing System)是一个类Unix操作系统的组合式印刷系统,允许一台电脑作为打印服务器。
        CUPS 1.1.22中的llpaswd程序存在漏洞。
        在当lppassw无法确保文件描述符0, 1, 和 2 打开的环境中运行时,lppasswd不会核实passwd.new文件不同于STDERR。这使得本地用户可以借助特定用户输入,触发错误,从而控制passwd.new的输出。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        http://www.cups.org/software.php

- 漏洞信息

12454
CUPS lppasswd passwd.new Arbitrary Append

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-12-16 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Easy Software Products LPPassWd CUPS Password File Truncation Vulnerability
Failure to Handle Exceptional Conditions 12004
No Yes
2004-12-15 12:00:00 2009-07-12 09:26:00
Discovery is credited to Bartlomiej Sieka.

- 受影响的程序版本

SGI ProPack 3.0
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 3
RedHat Desktop 3.0
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 3
Gentoo Linux
Easy Software Products lppasswd 1.1.22
Easy Software Products CUPS 1.1.22 rc1
Easy Software Products CUPS 1.1.20
+ ALT Linux ALT Linux Compact 2.3
+ ALT Linux ALT Linux Junior 2.3
+ Gentoo Linux 1.4 _rc3
+ Gentoo Linux 1.4 _rc2
+ Gentoo Linux 1.4 _rc1
+ MandrakeSoft apcupsd 2006.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ S.u.S.E. Linux Personal 9.1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32

- 漏洞讨论

Easy Software Products lppasswd is prone to a vulnerability that may let local attackers truncate the CUPS password file.

This issue occurs because the program ignores write errors. If a local attacker can fill up the drive or otherwise trigger a write error, it is possible that the operation of writing to the CUPS password file may be aborted.

The end result is that the CUPS password file may be truncated, likely causing a denial of service condition.

- 漏洞利用

There is no exploit required.

- 解决方案

RedHat has released advisories FEDORA-2004-559, and FEDORA-2004-560 to address this issue and other issues in Fedora Core 2 and 3. Please see the referenced advisories for further information.

Ubuntu has released an advisory (USN-50-1) dealing with this issue. Please see the referenced advisory for more information.

Gentoo has released an advisory GLSA 200412-25 to address various issues in CUPS. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to update their computers:

emerge --sync
emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23_rc1"

Gentoo has released an updated version of their CUPS advisory (GLSA 200412-25). Due to a recently discovered denial of service vulnerability, Gentoo advises that all CUPS users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23"

For more information please see the referenced Gentoo advisory (GLSA 200412-25).

Red Hat has released an advisory (RHSA-2005:013-20) to address various issues in CUPS. Please see the advisory in Web references for more information.

Mandrake has released advisory MDKSA-2005:008 to address various issues related to CUPS. Please see the referenced advisory for more information.

SGI has released advisory 20050101-01-U (SGI Advanced Linux Environment 3 Security Update #23) to address various issues in SGI Advanced Linux Environment 3. This advisory includes updated SGI ProPack 3 Service Pack 3 packages and patch 10137. Please see the referenced advisory for more information.

TurboLinux has released Security Announcement 17/Feb/2005 dealing with this and other issues; please see the reference section for more information.

Fedora has released Fedora Legacy Advisory (FLSA:2127) to address various issues affecting CUPS in Red Hat Linux 7.3, Red Hat Linux 9, and Fedora Core 1 for the i386 architecture. Please see the referenced advisory for more information.


Easy Software Products CUPS 1.1.20

Easy Software Products CUPS 1.1.22 rc1

SGI ProPack 3.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站