Description
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
CVSS Metrics
- Vector
- AV:L/AC:L/Au:N/C:N/I:P/A:N
- Access Vector
- local
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- none
- Integrity
- partial
- Availability
- none
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- EASY_SOFTWARE_PRODUCTS
- Published
- 1/10/2005
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
easy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupseasy_software_products : cupsredhat : fedora_coreredhat : fedora_core
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.