Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-6891

Опубликовано: 26 янв. 2014
Источник: debian

Описание

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cupsfixed1.7.1-1package
cupsnot-affectedwheezypackage
cupsnot-affectedsqueezepackage

Примечания

  • https://www.cups.org/str.php?L4319

Связанные уязвимости

ubuntu
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

redhat
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

nvd
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

github
больше 3 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.