[Pkg-cups-devel] Bug#692791: Privilege escalation (lpadmin -> root) in cups
Yves-Alexis Perez
corsac at debian.org
Sat Nov 10 12:49:43 UTC 2012
Hi,
a Debian user reported a bug in our BTS concerning cupsd. The bug is
available at http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791 and
upstream bug at http://www.cups.org/str.php?L4223 (restricted because
it's tagged security).
I'm unsure right now if it's an upstream issue or specific to Debian.
Basically, members of the lpadmin group (which is the group having admin
rights to cups, meaning they're supposed to be able to add/remove
printeers etc.) have admin access to the web interface, where they can
edit the config file and set some “dangerous” directives (like the log
filenames), which enable them to read or write files as the user running
the cupsd webserver.
In Debian case at least, it's run as root, meaning we have a privilege
escalation issue from lpadmin group to root.
A fix would be to not run cupsd web server as root, and maybe to
restrict it to some kind of chroot so it doesn't have access to
sensitive files
Can a CVE be allocated for this?
Regards,
--
Yves-Alexis
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part
URL: <http://lists.alioth.debian.org/pipermail/pkg-cups-devel/attachments/20121110/8fcd4e4e/attachment.pgp>
More information about the Pkg-cups-devel
mailing list