Amazon Linux AMI : cups (ALAS-2013-170)

high Nessus Plugin ID 69729

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

It was discovered that CUPS administrative users (members of the SystemGroups groups) who are permitted to perform CUPS configuration changes via the CUPS web interface could manipulate the CUPS configuration to gain unintended privileges. Such users could read or write arbitrary files with the privileges of the CUPS daemon, possibly allowing them to run arbitrary code with root privileges.
(CVE-2012-5519)

After installing this update, the ability to change certain CUPS configuration directives remotely will be disabled by default. The newly introduced ConfigurationChangeRestriction directive can be used to enable the changing of the restricted directives remotely.

Solution

Run 'yum update cups' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2013-170.html

Plugin Details

Severity: High

ID: 69729

File Name: ala_ALAS-2013-170.nasl

Version: 1.7

Type: local

Agent: unix

Published: 9/4/2013

Updated: 4/18/2018

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:cups, p-cpe:/a:amazon:linux:cups-debuginfo, p-cpe:/a:amazon:linux:cups-devel, p-cpe:/a:amazon:linux:cups-libs, p-cpe:/a:amazon:linux:cups-lpd, p-cpe:/a:amazon:linux:cups-php, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 3/14/2013

Reference Information

CVE: CVE-2012-5519

ALAS: 2013-170

RHSA: 2013:0580