Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7553

Опубликовано: 27 фев. 2017
Источник: debian
EPSS Низкий

Описание

The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
irssifixed0.8.20-2package
irssifixed0.8.17-1+deb8u2jessiepackage

Примечания

  • Fixed by: https://github.com/irssi/scripts.irssi.org/commit/f1b1eb154baa684fad5d65bf4dff79c8ded8b65a

  • https://irssi.org/2016/09/22/buf.pl-update/

  • https://www.openwall.com/lists/oss-security/2016/09/24/1

EPSS

Процентиль: 25%
0.00084
Низкий

Связанные уязвимости

CVSS3: 3.3
ubuntu
почти 9 лет назад

The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.

CVSS3: 3.3
redhat
больше 9 лет назад

The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.

CVSS3: 3.3
nvd
почти 9 лет назад

The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.

CVSS3: 3.3
github
больше 3 лет назад

The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.

EPSS

Процентиль: 25%
0.00084
Низкий