Show filters
46 Total Results
Displaying 41-46 of 46
Sort by:
Attacker Value
Unknown

CVE-2004-1270

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
lppasswd in CUPS 1.1.22, when run in environments that do not ensure that file descriptors 0, 1, and 2 are open when lppasswd is called, does not verify that the passwd.new file is different from STDERR, which allows local users to control output to passwd.new via certain user input that triggers an error message.
0
Attacker Value
Unknown

CVE-2004-1268

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
lppasswd in CUPS 1.1.22 ignores write errors when modifying the CUPS passwd file, which allows local users to corrupt the file by filling the associated file system and triggering the write errors.
0
Attacker Value
Unknown

CVE-2004-1269

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
lppasswd in CUPS 1.1.22 does not remove the passwd.new file if it encounters a file-size resource limit while writing to passwd.new, which causes subsequent invocations of lppasswd to fail.
0
Attacker Value
Unknown

CVE-2004-1125

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Buffer overflow in the Gfx::doImage function in Gfx.cc for xpdf 3.00, and other products that share code such as tetex-bin and kpdf in KDE 3.2.x to 3.2.3 and 3.3.x to 3.3.2, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted PDF file that causes the boundaries of a maskColors array to be exceeded.
0
Attacker Value
Unknown

CVE-2004-1267

Disclosure Date: January 10, 2005 (last updated February 22, 2025)
Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attackers to execute arbitrary code via a crafted HPGL file.
0
Attacker Value
Unknown

CVE-2004-2154

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
CUPS before 1.1.21rc1 treats a Location directive in cupsd.conf as case sensitive, which allows attackers to bypass intended ACLs via a printer name containing uppercase or lowercase letters that are different from what is specified in the directive.