1.9
CVE-2013-0200
- EPSS 0.08%
- Veröffentlicht 06.03.2013 20:55:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
HP Linux Imaging and Printing (HPLIP) through 3.12.4 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/hpcupsfilterc_#.bmp, (2) /tmp/hpcupsfilterk_#.bmp, (3) /tmp/hpcups_job#.out, (4) /tmp/hpijs_#####.out, or (5) /tmp/hpps_job#.out temporary file, a different vulnerability than CVE-2011-2722.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Hp ≫ Linux Imaging And Printing Project Version <= 3.12.4
Hp ≫ Linux Imaging And Printing Project Version1.0
Hp ≫ Linux Imaging And Printing Project Version2.0
Hp ≫ Linux Imaging And Printing Project Version2.7.10
Hp ≫ Linux Imaging And Printing Project Version3.9.2
Hp ≫ Linux Imaging And Printing Project Version3.9.4
Hp ≫ Linux Imaging And Printing Project Version3.9.4b
Hp ≫ Linux Imaging And Printing Project Version3.9.6
Hp ≫ Linux Imaging And Printing Project Version3.9.8
Hp ≫ Linux Imaging And Printing Project Version3.9.10
Hp ≫ Linux Imaging And Printing Project Version3.9.12
Hp ≫ Linux Imaging And Printing Project Version3.10.2
Hp ≫ Linux Imaging And Printing Project Version3.10.5
Hp ≫ Linux Imaging And Printing Project Version3.10.6
Hp ≫ Linux Imaging And Printing Project Version3.10.9
Hp ≫ Linux Imaging And Printing Project Version3.11.1
Hp ≫ Linux Imaging And Printing Project Version3.11.3
Hp ≫ Linux Imaging And Printing Project Version3.11.3a
Hp ≫ Linux Imaging And Printing Project Version3.11.5
Hp ≫ Linux Imaging And Printing Project Version3.11.7
Hp ≫ Linux Imaging And Printing Project Version3.11.10
Redhat ≫ Enterprise Linux Version6.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.231 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 1.9 | 3.4 | 2.9 |
AV:L/AC:M/Au:N/C:N/I:P/A:N
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.