[cups.general] postscript exploits possible?
Michael Sweet
mike at easysw.com
Thu May 10 12:23:03 PDT 2007
Adam Monsen wrote:
> (silly?) Quick question on using printer drivers with CUPS. Is it
> possible that a .PPD file could contain malicious code, and that CUPS
> could/would execute that to do something bad to the printer and/or the
> operating system?
To the printer, possibly, to the operating system, unlikely since
a) Ghostscript (the only real consumer of PostScript commands) is
run in a very restricted mode (no direct access to the filesystem)
and b) all filters run as a restricted user (typically "lp").
> For instance, if cupsd was running as root, could there be an "rm -rf
> /" or something in the .PPD, and if so would CUPS just execute that
> and trash the hard drive?
No. The worst someone could do with the standard CUPS release
(assuming they did find a vulnerability in a filter) would be to
delete temporary files in /var/spool/cups/temp. If you are running
on a Debian-based distro, your risks are somewhat higher because
they use a patch that runs everything as user "lp" so a filter could
remove CUPS configuration and spool files as well.
--
______________________________________________________________________
Michael Sweet, Easy Software Products mike at easysw dot com
Internet Printing and Document Software http://www.easysw.com
More information about the cups
mailing list