Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2001-1002Redhat Linux vulnerability

6 documents6 sources
Severity
7.5HIGHNVD
EPSS
4.7%
top 10.60%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 31
Latest updateApr 30

Description

The default configuration of the DVI print filter (dvips) in Red Hat Linux 7.0 and earlier does not run dvips in secure mode when dvips is executed by lpd, which could allow remote attackers to gain privileges by printing a DVI file that contains malicious commands.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages1 packages

NVDredhat/linux6.2, 7.0, 7.1+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-28fj-h7cm-23g6: The default configuration of the DVI print filter (dvips) in Red Hat Linux 72022-04-30
CVEList
CVE-2001-1002: The default configuration of the DVI print filter (dvips) in Red Hat Linux 72002-06-25

💥Exploits & PoCs

1
Exploit-DB
RedHat 6.2/7.0/7.1 Lpd - Remote Command Execution via DVI Printfilter Configuration Error2001-08-27

📋Vendor Advisories

1
Red Hat
security flaw2001-08-27

💬Community

1
Bugzilla
CVE-2001-1002 security flaw2018-08-16
CVE-2001-1002 — Redhat Linux vulnerability | cvebase