ALAS-2013-170 ---- cupsID: oval:org.secpod.oval:def:1600216 | Date: (C)2016-05-19 (M)2023-12-07 |
Class: PATCH | Family: unix |
It was discovered that CUPS administrative users who are permitted to perform CUPS configuration changes via the CUPS web interface could manipulate the CUPS configuration to gain unintended privileges. Such users could read or write arbitrary files with the privileges of the CUPS daemon, possibly allowing them to run arbitrary code with root privileges. After installing this update, the ability to change certain CUPS configuration directives remotely will be disabled by default. The newly introduced ConfigurationChangeRestriction directive can be used to enable the changing of the restricted directives remotely.
Platform: |
Amazon Linux AMI |