Bug 864515 (CVE-2012-4510)
Summary: | CVE-2012-4510 cups-pk-helper: Insecure wrapping of cupsGetFile() and cupsPutFile() methods | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> | ||||||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||||||
Status: | CLOSED WONTFIX | QA Contact: | |||||||||
Severity: | medium | Docs Contact: | |||||||||
Priority: | medium | ||||||||||
Version: | unspecified | CC: | jrusnack, mkasik, security-response-team | ||||||||
Target Milestone: | --- | Keywords: | Security | ||||||||
Target Release: | --- | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | cups-pk-helper 0.2.3 | Doc Type: | Bug Fix | ||||||||
Doc Text: |
A flaw was found in the way the cupsGetFile() and cupsPutFile() functions of cups-pk-helper checked user IDs. If a local attacker performed a symbolic link attack, and was able to trick a CUPS administrator into approving the file transmission, the attacker could possibly use this flaw to access or modify certain system files, potentially leading to privilege escalation.
|
Story Points: | --- | ||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2019-06-10 10:59:27 UTC | Type: | --- | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Bug Depends On: | 865815 | ||||||||||
Bug Blocks: | 864521 | ||||||||||
Attachments: |
|
Description
Jan Lieskovsky
2012-10-09 13:33:08 UTC
Created attachment 624105 [details]
Relevant patch from Vincent Untz
This issue affects the version of the cups-pk-helper package, as shipped with Red Hat Enterprise Linux 6. -- This issue affects the versions of the cups-pk-helper package, as shipped with Fedora release of 16 and 17. Created attachment 624699 [details]
Updated patch from Vincent Untz
Created attachment 624821 [details]
Patch from Vincent Untz
Corrected patch from upstream
The CVE identifier of CVE-2012-4510 has been assigned to this issue. Created cups-pk-helper tracking bugs for this issue Affects: fedora-all [bug 865815] External reference: (none) |