Vulnerability Description
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Cups | <= 1.7.0 |
| Canonical | Ubuntu Linux | 12.10 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0021.html
- http://secunia.com/advisories/56531Vendor Advisory
- http://www.cups.org/blog.php?L704
- http://www.cups.org/str.php?L4319ExploitPatch
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:015
- http://www.ubuntu.com/usn/USN-2082-1
- http://advisories.mageia.org/MGASA-2014-0021.html
- http://secunia.com/advisories/56531Vendor Advisory
- http://www.cups.org/blog.php?L704
- http://www.cups.org/str.php?L4319ExploitPatch
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:015
- http://www.ubuntu.com/usn/USN-2082-1
FAQ
What is CVE-2013-6891?
CVE-2013-6891 is a vulnerability with a CVSS score of 1.2 (LOW). lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups...
How severe is CVE-2013-6891?
CVE-2013-6891 has been rated LOW with a CVSS base score of 1.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6891?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Cups, Canonical Ubuntu Linux.