Описание
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.7.1-1 |
| lucid | not-affected | code not present |
| precise | not-affected | code not present |
| quantal | released | 1.6.1-0ubuntu11.5 |
| raring | released | 1.6.2-1ubuntu8 |
| saucy | released | 1.7.0~rc1-0ubuntu5.2 |
| upstream | released | 1.7.1-1 |
Показывать по
EPSS
1.2 Low
CVSS2
Связанные уязвимости
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
lppasswd in CUPS before 1.7.1, when running with setuid privileges, al ...
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
EPSS
1.2 Low
CVSS2