ID

VAR-201803-1130


CVE

CVE-2017-18248


TITLE

CUPS Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-013048

DESCRIPTION

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification. CUPS Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Apple CUPS (Common Unix Printing System) is an open source printing system for OS X and Unix-like systems developed by Apple. The system is based on the Internet Printing Protocol (IPP) and provides most PostScript and raster printer services. A security vulnerability exists in the 'add_job' function in Apple CUPS versions prior to 2.2.6. ========================================================================== Ubuntu Security Notice USN-3713-1 July 11, 2018 cups vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in CUPS. A remote attacker could possibly use this issue to cause CUPS to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 17.10 and Ubuntu 18.04 LTS. (CVE-2017-18248) Dan Bastone discovered that the CUPS dnssd backend incorrectly handled certain environment variables. A local attacker could possibly use this issue to escalate privileges. (CVE-2018-4180) Eric Rafaloff and John Dunlap discovered that CUPS incorrectly handled certain include directives. A local attacker could possibly use this issue to read arbitrary files. (CVE-2018-4181) Dan Bastone discovered that the CUPS AppArmor profile incorrectly confined the dnssd backend. A local attacker could possibly use this issue to escape confinement. (CVE-2018-6553) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: cups 2.2.7-1ubuntu2.1 Ubuntu 17.10: cups 2.2.4-7ubuntu3.1 Ubuntu 16.04 LTS: cups 2.1.3-4ubuntu0.5 Ubuntu 14.04 LTS: cups 1.7.2-0ubuntu1.10 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3713-1 CVE-2017-18248, CVE-2018-4180, CVE-2018-4181, CVE-2018-6553 Package Information: https://launchpad.net/ubuntu/+source/cups/2.2.7-1ubuntu2.1 https://launchpad.net/ubuntu/+source/cups/2.2.4-7ubuntu3.1 https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.5 https://launchpad.net/ubuntu/+source/cups/1.7.2-0ubuntu1.10

Trust: 1.8

sources: NVD: CVE-2017-18248 // JVNDB: JVNDB-2017-013048 // VULHUB: VHN-109351 // PACKETSTORM: 148510

AFFECTED PRODUCTS

vendor:applemodel:cupsscope:ltversion:2.2.6

Trust: 1.8

vendor:applemodel:cupsscope:eqversion:2.2.3

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:1.7.4

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:2.2.4

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:1.7.1

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:2.2.5

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:1.7.2

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:2.0

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:2.1

Trust: 0.6

vendor:applemodel:cupsscope:eqversion:1.7.3

Trust: 0.6

sources: JVNDB: JVNDB-2017-013048 // CNNVD: CNNVD-201803-933 // NVD: CVE-2017-18248

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-18248
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-18248
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201803-933
value: LOW

Trust: 0.6

VULHUB: VHN-109351
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-18248
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-109351
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-18248
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-109351 // JVNDB: JVNDB-2017-013048 // CNNVD: CNNVD-201803-933 // NVD: CVE-2017-18248

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-109351 // JVNDB: JVNDB-2017-013048 // NVD: CVE-2017-18248

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-933

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201803-933

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013048

PATCH

title:DBUS notifications could crash the scheduler (Issue #5143)url:https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3

Trust: 0.8

title:Remote DoS attack against cupsd via invalid username and malicious D-Bus library #5143url:https://github.com/apple/cups/issues/5143

Trust: 0.8

title:Releases: v2.2.6url:https://github.com/apple/cups/releases/tag/v2.2.6

Trust: 0.8

title:Apple CUPS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79426

Trust: 0.6

sources: JVNDB: JVNDB-2017-013048 // CNNVD: CNNVD-201803-933

EXTERNAL IDS

db:NVDid:CVE-2017-18248

Trust: 2.6

db:JVNDBid:JVNDB-2017-013048

Trust: 0.8

db:CNNVDid:CNNVD-201803-933

Trust: 0.7

db:PACKETSTORMid:148510

Trust: 0.2

db:VULHUBid:VHN-109351

Trust: 0.1

sources: VULHUB: VHN-109351 // JVNDB: JVNDB-2017-013048 // PACKETSTORM: 148510 // CNNVD: CNNVD-201803-933 // NVD: CVE-2017-18248

REFERENCES

url:https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3

Trust: 1.7

url:https://github.com/apple/cups/issues/5143

Trust: 1.7

url:https://github.com/apple/cups/releases/tag/v2.2.6

Trust: 1.7

url:https://security.cucumberlinux.com/security/details.php?id=346

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/05/msg00018.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2018/07/msg00003.html

Trust: 1.1

url:https://usn.ubuntu.com/3713-1/

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-18248

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-18248

Trust: 0.8

url:https://launchpad.net/ubuntu/+source/cups/1.7.2-0ubuntu1.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/cups/2.2.7-1ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/cups/2.2.4-7ubuntu3.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-6553

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/cups/2.1.3-4ubuntu0.5

Trust: 0.1

url:https://usn.ubuntu.com/usn/usn-3713-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4180

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4181

Trust: 0.1

sources: VULHUB: VHN-109351 // JVNDB: JVNDB-2017-013048 // PACKETSTORM: 148510 // CNNVD: CNNVD-201803-933 // NVD: CVE-2017-18248

CREDITS

Ubuntu

Trust: 0.1

sources: PACKETSTORM: 148510

SOURCES

db:VULHUBid:VHN-109351
db:JVNDBid:JVNDB-2017-013048
db:PACKETSTORMid:148510
db:CNNVDid:CNNVD-201803-933
db:NVDid:CVE-2017-18248

LAST UPDATE DATE

2024-11-23T21:25:34.413000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-109351date:2018-07-13T00:00:00
db:JVNDBid:JVNDB-2017-013048date:2018-05-23T00:00:00
db:CNNVDid:CNNVD-201803-933date:2018-03-27T00:00:00
db:NVDid:CVE-2017-18248date:2024-11-21T03:19:40.680

SOURCES RELEASE DATE

db:VULHUBid:VHN-109351date:2018-03-26T00:00:00
db:JVNDBid:JVNDB-2017-013048date:2018-05-23T00:00:00
db:PACKETSTORMid:148510date:2018-07-11T22:07:12
db:CNNVDid:CNNVD-201803-933date:2018-03-27T00:00:00
db:NVDid:CVE-2017-18248date:2018-03-26T17:29:00.207