Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-4442

Опубликовано: 05 окт. 2012
Источник: debian
EPSS Низкий

Описание

Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
monkeyremovedpackage

EPSS

Процентиль: 19%
0.00062
Низкий

Связанные уязвимости

ubuntu
больше 13 лет назад

Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.

nvd
больше 13 лет назад

Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.

github
больше 3 лет назад

Monkey HTTP Daemon 0.9.3 retains the supplementary group IDs of the root account during operations with a non-root effective UID, which might allow local users to bypass intended file-read restrictions by leveraging a race condition in a file-permission check.

EPSS

Процентиль: 19%
0.00062
Низкий