Описание
Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*
Конфигурация 2
Одно из
cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*
EPSS
Процентиль: 14%
0.00047
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
redhat
около 25 лет назад
Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.
github
около 3 лет назад
Format string vulnerability in startprinting() function of printjob.c in BSD-based lpr lpd package may allow local users to gain privileges via an improper syslog call that uses format strings from the checkremote() call.
EPSS
Процентиль: 14%
0.00047
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other