Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10729

Опубликовано: 24 окт. 2018
Источник: debian

Описание

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
amandafixed1:3.3.9-1package

Примечания

  • https://www.exploit-db.com/exploits/39217/

  • /usr/lib/amanda/runtar can only be run by members of the backup

  • group (which is root-equivalent due to being able to perform restores e.g.)

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

CVSS3: 4.2
redhat
больше 9 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

CVSS3: 7.8
nvd
почти 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

suse-cvrf
больше 6 лет назад

Security update for amanda

suse-cvrf
больше 6 лет назад

Security update for amanda