Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-2910

Опубликовано: 15 нояб. 2019
Источник: debian

Описание

The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ax25-toolsfixed0.0.8-13.2package
ax25-toolsno-dsalennypackage
ax25-toolsno-dsasqueezepackage

Связанные уязвимости

CVSS3: 6.7
ubuntu
около 6 лет назад

The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.

CVSS3: 6.7
nvd
около 6 лет назад

The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.

CVSS3: 6.7
github
почти 4 года назад

The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.