Lucene search

K
rosalinuxROSA LABROSA-SA-2021-1816
HistoryJul 02, 2021 - 4:35 p.m.

Advisory ROSA-SA-2021-1816

2021-07-0216:35:34
ROSA LAB
abf.rosalinux.ru
5

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.016 Low

EPSS

Percentile

87.3%

Software: cups 1.6.3
OS: Cobalt 7.9

CVE-ID: CVE-2013-6891
CVE-Crit: HIGH
CVE-DESC: lppasswd in CUPS before 1.7.1 when run with setuid privileges allows local users to read parts of arbitrary files via modified HOME environment variable and symbolic link attack using .cups / client.conf.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2017-18248
CVE-Crit: MEDIUM
CVE-DESC: The add_job function in scheduler / ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be reset by remote attackers by sending print jobs with an invalid user name associated with a D-Bus notification. .
CVE-STATUS: Default
CVE-REV: Default

CVE-ID: CVE-2018-4300
CVE-Crit: MEDIUM
CVE-DESC: A session cookie generated by the CUPS web interface was easily guessed on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.
CVE-STATUS: default
CVE-REV: default

OSVersionArchitecturePackageVersionFilename
Cobaltanynoarchcups< 1.6.3UNKNOWN

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.9 Medium

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.016 Low

EPSS

Percentile

87.3%