Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-6891

Опубликовано: 26 янв. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 1.2

Описание

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

РелизСтатусПримечание
devel

not-affected

1.7.1-1
lucid

not-affected

code not present
precise

not-affected

code not present
quantal

released

1.6.1-0ubuntu11.5
raring

released

1.6.2-1ubuntu8
saucy

released

1.7.0~rc1-0ubuntu5.2
upstream

released

1.7.1-1

Показывать по

EPSS

Процентиль: 14%
0.00046
Низкий

1.2 Low

CVSS2

Связанные уязвимости

redhat
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

nvd
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

debian
около 12 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, al ...

github
больше 3 лет назад

lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.

EPSS

Процентиль: 14%
0.00046
Низкий

1.2 Low

CVSS2