Bug 558460 (CVE-2010-0393)

Summary: CVE-2010-0393: cups possible arbitrary code execution via suid lppasswd (STR #3482)
Product: [Other] Security Response Reporter: Tim Waugh <twaugh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bressers, security-response-team, twaugh, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-03-08 20:08:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Tim Waugh 2010-01-25 12:38:05 UTC
CUPS 1.3.x and earlier ships setuid binaries which use environment variables to set the directories in which they operate.

Comment 7 Josh Bressers 2010-01-27 19:40:00 UTC
I don't think this affects RHEL 3 and 4. The _cupsGetlang function doesn't exist in those versions.

I also don't see any localization happening in lppasswd.c.

Tim, am I missing something?

Thanks.

Comment 9 Tim Waugh 2010-02-02 13:26:53 UTC
You are correct on all counts.

RHEL-5: not setuid
RHEL-4: no localization
RHEL-3: no localization

Denial of service for lppasswd is not really anything to worry about I think.

Comment 10 Vincent Danen 2010-03-04 05:05:02 UTC
This issue is now public, although the upstream bug is still private: http://www.cups.org/str.php?L3482 (Ubuntu has released an update addressing this).

Comment 11 Vincent Danen 2010-03-08 20:08:05 UTC
This issue does not affect Red Hat Enterprise Linux 3 and 4 due to the lack of localization in lppasswd as provided in those releases.  The affected code is present in Red Hat Enterprise Linux 5, however lppasswd is not shipped setuid so is not vulnerable to this issue.  If a user were to enable the setuid bit on lppasswd, the impact would only be a crash of lppasswd due to FORTIFY_SOURCE protections.

There are no plans to correct this issue in Red Hat Enterprise Linux 5.