Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10152

Опубликовано: 28 мар. 2017
Источник: debian
EPSS Низкий

Описание

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
hesiodfixed3.2.1-3.1package
hesiodno-dsastretchpackage
hesiodno-dsajessiepackage

Примечания

  • https://github.com/achernya/hesiod/pull/10

  • https://bugzilla.redhat.com/show_bug.cgi?id=1332493

EPSS

Процентиль: 83%
0.01873
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

CVSS3: 7
redhat
почти 10 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

CVSS3: 9.8
nvd
почти 9 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

CVSS3: 9.8
github
больше 3 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

CVSS3: 9.8
fstec
почти 10 лет назад

Уязвимость функции read_config_file (lib/hesiod.c) демона для обеспечения доступа к базам данных DNS Hesiod, позволяющая нарушителю получить привилегии root

EPSS

Процентиль: 83%
0.01873
Низкий