Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-0301

Опубликовано: 04 фев. 2010
Источник: debian
EPSS Низкий

Описание

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
maildropfixed2.2.0-3.1package

EPSS

Процентиль: 16%
0.00051
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

redhat
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

nvd
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

github
больше 3 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

EPSS

Процентиль: 16%
0.00051
Низкий