AppArmor cupsd Sandbox Bypass Due to Use of Hard Links

CVE-2018-6553

8.8HIGH

Key Information

Vendor
Debian
Status
Cups
Vendor
CVE Published:
11 July 2018

Summary

The CUPS AppArmor profile incorrectly confined the dnssd backend due to use of hard links. A local attacker could possibly use this issue to escape confinement. This flaw affects versions prior to 2.2.7-1ubuntu2.1 in Ubuntu 18.04 LTS, prior to 2.2.4-7ubuntu3.1 in Ubuntu 17.10, prior to 2.1.3-4ubuntu0.5 in Ubuntu 16.04 LTS, and prior to 1.7.2-0ubuntu1.10 in Ubuntu 14.04 LTS.

Affected Version(s)

cups < 2.2.7-1ubuntu2.1

cups < 2.2.4-7ubuntu3.1

cups < 2.1.3-4ubuntu0.5

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Dan Bastone
.