Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2018.2172.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2018:2172-1)
Summary:The remote host is missing an update for the 'cups' package(s) announced via the SUSE-SU-2018:2172-1 advisory.
Description:Summary:
The remote host is missing an update for the 'cups' package(s) announced via the SUSE-SU-2018:2172-1 advisory.

Vulnerability Insight:
This update for cups fixes the following issues:
The following security vulnerabilities were fixed:
- Fixed a local privilege escalation to root and sandbox bypasses in the
scheduler
- CVE-2018-4180: Fixed a local privilege escalation to root in dnssd
backend (bsc#1096405)
- CVE-2018-4181: Limited local file reads as root via cupsd.conf include
directive (bsc#1096406)
- CVE-2018-4182: Fixed a sandbox bypass due to insecure error handling
(bsc#1096407)
- CVE-2018-4183: Fixed a sandbox bypass due to profile misconfiguration
(bsc#1096408)

Affected Software/OS:
'cups' package(s) on SUSE Linux Enterprise Module for Basesystem 15, SUSE Linux Enterprise Module for Desktop Applications 15, SUSE Linux Enterprise Module for Development Tools 15.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-4180
Debian Security Information: DSA-4243 (Google Search)
https://www.debian.org/security/2018/dsa-4243
https://security.gentoo.org/glsa/201908-08
https://lists.debian.org/debian-lts-announce/2018/07/msg00014.html
https://usn.ubuntu.com/3713-1/
Common Vulnerability Exposure (CVE) ID: CVE-2018-4181
Common Vulnerability Exposure (CVE) ID: CVE-2018-4182
Common Vulnerability Exposure (CVE) ID: CVE-2018-4183
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.