Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hxq6-gg87-xqc4

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

EPSS

Процентиль: 30%
0.00107
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

redhat
почти 21 год назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

nvd
почти 21 год назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.

debian
почти 21 год назад

lppasswd in CUPS 1.1.22, when run in environments that do not ensure t ...

EPSS

Процентиль: 30%
0.00107
Низкий