First published: Wed Dec 22 2004(Updated: )
lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.0.4 | |
CUPS (Common UNIX Printing System) | =1.0.4_8 | |
CUPS (Common UNIX Printing System) | =1.1.1 | |
CUPS (Common UNIX Printing System) | =1.1.4 | |
CUPS (Common UNIX Printing System) | =1.1.4_2 | |
CUPS (Common UNIX Printing System) | =1.1.4_3 | |
CUPS (Common UNIX Printing System) | =1.1.4_5 | |
CUPS (Common UNIX Printing System) | =1.1.6 | |
CUPS (Common UNIX Printing System) | =1.1.7 | |
CUPS (Common UNIX Printing System) | =1.1.10 | |
CUPS (Common UNIX Printing System) | =1.1.12 | |
CUPS (Common UNIX Printing System) | =1.1.13 | |
CUPS (Common UNIX Printing System) | =1.1.14 | |
CUPS (Common UNIX Printing System) | =1.1.15 | |
CUPS (Common UNIX Printing System) | =1.1.16 | |
CUPS (Common UNIX Printing System) | =1.1.17 | |
CUPS (Common UNIX Printing System) | =1.1.18 | |
CUPS (Common UNIX Printing System) | =1.1.19 | |
CUPS (Common UNIX Printing System) | =1.1.19_rc5 | |
CUPS (Common UNIX Printing System) | =1.1.20 | |
CUPS (Common UNIX Printing System) | =1.1.21 | |
CUPS (Common UNIX Printing System) | =1.1.22_rc1 | |
Red Hat Fedora Core | =core_2.0 | |
Red Hat Fedora Core | =core_3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1270 has been classified with a moderate severity due to its potential impact on local users.
To mitigate CVE-2004-1270, ensure that file descriptors 0, 1, and 2 are correctly managed when running lppasswd.
CVE-2004-1270 affects various versions of CUPS, specifically from 1.0.4 to 1.1.22.
CVE-2004-1270 is considered a local vulnerability, meaning it requires local user access for exploitation.
Yes, users should update to a fixed version of CUPS beyond 1.1.22 to eliminate the vulnerability.