Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-1142

Опубликовано: 23 нояб. 2022
Источник: debian
EPSS Низкий

Описание

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
open-vm-toolsfixed2:8.4.2+2011.08.21-471295-1package

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=474285

  • https://github.com/vmware/open-vm-tools/commit/76dccec4dd4002cec240e71e0042cdacfae6cca7 (2011.03.28-387002)

EPSS

Процентиль: 38%
0.00167
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

CVSS3: 6.7
redhat
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

CVSS3: 6.7
nvd
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

CVSS3: 6.7
github
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

EPSS

Процентиль: 38%
0.00167
Низкий