[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#755807: CUPS listens on *all* interfaces per default when installed on machines using systemd



Package: cups-daemon
Version: 1.7.4-1
Severity: serious
Justification: Information leak and possible security vulnerability
Tags: security

Hi,

installing (not upgrading!) the cups-daemon package on a machine using systemd
as PID 1 creates the /etc/cups/cupsd-systemd-listen.conf file like this:

	[Socket]
	# This file was generated by CUPS and _WILL_ be deleted or overwritten by it!
	# It has to be kept in sync with the Port and Listen stanzas in /etc/cups/cupsd.conf
	# It is by default symlinked as cups-listen.conf in the
	# /etc/systemd/system/cups.socket.d/ directory. Remove the symlink
	# and write your own file there if you don't want this. See systemd.socket(5).
	# Matches the default 'Listen localhost:631' from cupsd.conf.default
	ListenStream=0.0.0.0:631
	ListenStream=[::]:631

As this file gets symlinked from the /etc/systemd/system/cups.socket.d/
directory, this means that systemd will listen on *all* interfaces and
hand the incoming connections to CUPS.

Admittedly, CUPS still enforces it's own access limitations set
in /etc/cups/cupsd.conf, but only after initially accepting the
connection. It will then respond with a HTTP 403 (Forbidden) error page,
confirming that there is indeed a CUPS daemon running and leaking (at
least) its version number and the system locale.

Best regards

Alexander Kurtz

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: