Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5076

Опубликовано: 14 нояб. 2008
Источник: debian
EPSS Низкий

Описание

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
htopfixed0.8.1-2package

Примечания

  • That scenario is too constructed to call it a security issue, especially

  • given that the standard top will display the maliciously hidden processes

  • just fine.

EPSS

Процентиль: 16%
0.00067
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

redhat
около 17 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

nvd
около 17 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

github
больше 3 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

EPSS

Процентиль: 16%
0.00067
Низкий