CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS
Percentile
39.3%
Severity: Medium
Date : 2021-02-06
CVE-ID : CVE-2020-10001
Package : cups
Type : information disclosure
Remote : No
Link : https://security.archlinux.org/AVG-1529
The package cups before version 1:2.3.3op2-1 is vulnerable to
information disclosure.
Upgrade to 1:2.3.3op2-1.
The problem has been fixed upstream in version 2.3.3op2.
None.
A security issue was found in cups before version 2.3.3op2. A missing
length check in the ippReadIO function could lead to a buffer over-
read.
A remote attacker might be able to cause a denial of service or access
sensitive information.
https://bugzilla.redhat.com/show_bug.cgi?id=1921680
https://bugzilla.redhat.com/attachment.cgi?id=1752147
https://github.com/OpenPrinting/cups/commit/efbea1742bd30f842fbbfb87a473e5c84f4162f9
https://security.archlinux.org/CVE-2020-10001
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS
Percentile
39.3%