lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-6891 from the MITRE CVE dictionary dictionary and NIST NVD.
Not vulnerable. This issue did not affect the versions of CUPS as shipped with Red Hat Enterprise Linux 5 and 6 as they did not ship with an suid-root lppasswd binary.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 1.2 |
---|---|
Base Metrics | AV:L/AC:H/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | cups | Not affected |
Red Hat Enterprise Linux 6 | cups | Not affected |
Red Hat Enterprise Linux 5 | cups | Not affected |