Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-2653

Опубликовано: 12 июл. 2012
Источник: debian
EPSS Низкий

Описание

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
arpwatchfixed2.1a15-1.2package

Примечания

  • Debian build includes the vulnerable patch (in .diff.gz)

EPSS

Процентиль: 82%
0.01826
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.

redhat
больше 13 лет назад

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.

nvd
больше 13 лет назад

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.

msrc
около 2 месяцев назад

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.

github
больше 3 лет назад

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.

EPSS

Процентиль: 82%
0.01826
Низкий