Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-6358

Опубликовано: 15 дек. 2007
Источник: debian
EPSS Низкий

Описание

pdftops.pl before 1.20 in alternate pdftops filter allows local users to overwrite arbitrary files via a symlink attack on the pdfin.[PID].tmp temporary file, which is created when pdftops reads a PDF file from stdin, such as when pdftops is invoked by CUPS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cupsfixed1.3.5-1package
cupsysfixed1.3.5-1package
cupsysno-dsasargepackage

Примечания

  • the debian package is a bit confusing here as it also ships a pdftops

  • wrapper script as an example but the original script is installed

  • under /usr/lib/cups/filters

EPSS

Процентиль: 20%
0.00063
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

pdftops.pl before 1.20 in alternate pdftops filter allows local users to overwrite arbitrary files via a symlink attack on the pdfin.[PID].tmp temporary file, which is created when pdftops reads a PDF file from stdin, such as when pdftops is invoked by CUPS.

nvd
больше 17 лет назад

pdftops.pl before 1.20 in alternate pdftops filter allows local users to overwrite arbitrary files via a symlink attack on the pdfin.[PID].tmp temporary file, which is created when pdftops reads a PDF file from stdin, such as when pdftops is invoked by CUPS.

github
больше 3 лет назад

pdftops.pl before 1.20 in alternate pdftops filter allows local users to overwrite arbitrary files via a symlink attack on the pdfin.[PID].tmp temporary file, which is created when pdftops reads a PDF file from stdin, such as when pdftops is invoked by CUPS.

fstec
больше 17 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 20%
0.00063
Низкий