Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hxq6-gg87-xqc4

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

EPSS

Процентиль: 30%
0.00107
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

redhat
больше 20 лет назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

nvd
больше 20 лет назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

debian
больше 20 лет назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure t ...

EPSS

Процентиль: 30%
0.00107
Низкий