---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Ubuntu hplip Privilege Escalation Security Issue SECUNIA ADVISORY ID: SA33539 VERIFY ADVISORY: http://secunia.com/advisories/33539/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Ubuntu Linux 7.10 http://secunia.com/advisories/product/16251/ DESCRIPTION: Ubuntu has acknowledged a security issue in hplip, which can be exploited by malicious, local users to gain escalated privileges. The security issue is caused due to the "postinst" script of the hplip package trying to change the permissions of user config files in an insecure manner, which can be exploited to gain root privileges when e.g. installing or updating the hplip package. SOLUTION: Apply updated packages. -- Ubuntu 7.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.7.7.dfsg.1-0ubuntu5.3.diff.gz Size/MD5: 149462 e8b5cb18aff082738bfcfe069eb873f5 http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.7.7.dfsg.1-0ubuntu5.3.dsc Size/MD5: 1064 531e707f0cbace5f1eb82039e409c306 http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.7.7.dfsg.1.orig.tar.gz Size/MD5: 14361049 ae5165d46413db8119979f5b3345f7a5 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-data_2.7.7.dfsg.1-0ubuntu5.3_all.deb Size/MD5: 6898006 691895b0f8e5fc93bcb86d47d11da1af http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-doc_2.7.7.dfsg.1-0ubuntu5.3_all.deb Size/MD5: 4146918 d4e0b928aacc84bbe2a05862050a5963 http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-gui_2.7.7.dfsg.1-0ubuntu5.3_all.deb Size/MD5: 117628 91f0c9d09f2520e76b3a3e6cde4abd63 http://security.ubuntu.com/ubuntu/pool/universe/h/hplip/hpijs-ppds_2.7.7+2.7.7.dfsg.1-0ubuntu5.3_all.deb Size/MD5: 480134 59604754cef89d7b5ae128ecf20f44da amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hpijs_2.7.7+2.7.7.dfsg.1-0ubuntu5.3_amd64.deb Size/MD5: 341576 918813fb4741326051c7480ffeae9a9a http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-dbg_2.7.7.dfsg.1-0ubuntu5.3_amd64.deb Size/MD5: 770122 ccef78fc8a55b4e94318931964e9e97b http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.7.7.dfsg.1-0ubuntu5.3_amd64.deb Size/MD5: 302856 f2a47e27a69aa016334a1ffdac105be1 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hpijs_2.7.7+2.7.7.dfsg.1-0ubuntu5.3_i386.deb Size/MD5: 334690 dd891b2df494fd1fbc46abd25b9ef7db http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-dbg_2.7.7.dfsg.1-0ubuntu5.3_i386.deb Size/MD5: 747250 4676694a4d20445e64f3f4dc91aaa44c http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.7.7.dfsg.1-0ubuntu5.3_i386.deb Size/MD5: 290282 921463222e2b642fb5bc16083d8b70ac lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/h/hplip/hpijs_2.7.7+2.7.7.dfsg.1-0ubuntu5.3_lpia.deb Size/MD5: 337798 9c060add246bb5212706b9dd0d92cc51 http://ports.ubuntu.com/pool/main/h/hplip/hplip-dbg_2.7.7.dfsg.1-0ubuntu5.3_lpia.deb Size/MD5: 926096 af4481ea010212486ea621103329cf13 http://ports.ubuntu.com/pool/main/h/hplip/hplip_2.7.7.dfsg.1-0ubuntu5.3_lpia.deb Size/MD5: 290082 f26b9fc31e3457719b3102b3a9c77b5b powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hpijs_2.7.7+2.7.7.dfsg.1-0ubuntu5.3_powerpc.deb Size/MD5: 348258 66f9714865cad898e10e98ef83f6e443 http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-dbg_2.7.7.dfsg.1-0ubuntu5.3_powerpc.deb Size/MD5: 784504 0c76dac215474fc62900aea547168387 http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.7.7.dfsg.1-0ubuntu5.3_powerpc.deb Size/MD5: 319006 52d13211d1681fe90b74951dc204a788 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hpijs_2.7.7+2.7.7.dfsg.1-0ubuntu5.3_sparc.deb Size/MD5: 332756 a3411ca114399f0359b949462e0313ab http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip-dbg_2.7.7.dfsg.1-0ubuntu5.3_sparc.deb Size/MD5: 717210 401d1050417a9a8608198088abb9e305 http://security.ubuntu.com/ubuntu/pool/main/h/hplip/hplip_2.7.7.dfsg.1-0ubuntu5.3_sparc.deb Size/MD5: 289370 f92c0c0f6a2f2ccef18d3874db728bf7 PROVIDED AND/OR DISCOVERED BY: Reported in an Ubuntu bug. ORIGINAL ADVISORY: USN-708-1: https://lists.ubuntu.com/archives/ubuntu-security-announce/2009-January/000826.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------