lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    20 Nov 2024, 23:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://tigger.uic.edu/~jlongs2/holes/cups2.txt - Exploit, Vendor Advisory | |
| References | () http://www.gentoo.org/security/en/glsa/glsa-200412-25.xml - | |
| References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:008 - | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-013.html - | |
| References | () http://www.redhat.com/support/errata/RHSA-2005-053.html - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18606 - | |
| References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10398 - | |
| References | () https://usn.ubuntu.com/50-1/ - | 
Information
                Published : 2005-01-10 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1268
Mitre link : CVE-2004-1268
CVE.ORG link : CVE-2004-1268
JSON object : View
Products Affected
                easy_software_products
- cups
redhat
- fedora_core
CWE
                