Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-1033

Опубликовано: 28 мая 2008
Источник: redhat

Описание

The scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug logging is enabled and a printer requires a password, allows attackers to obtain sensitive information (credentials) by reading the log data, related to "authentication environment variables."

Отчет

Not vulnerable. This issue did not affect the versions of cups as shipped with Red Hat Enterprise Linux 3, 4, or 5.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=449746cups: password disclosure via debug log

Связанные уязвимости

nvd
больше 17 лет назад

The scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug logging is enabled and a printer requires a password, allows attackers to obtain sensitive information (credentials) by reading the log data, related to "authentication environment variables."

debian
больше 17 лет назад

The scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug ...

github
больше 3 лет назад

The scheduler in CUPS in Apple Mac OS X 10.5 before 10.5.3, when debug logging is enabled and a printer requires a password, allows attackers to obtain sensitive information (credentials) by reading the log data, related to "authentication environment variables."