Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1000082

Опубликовано: 07 июл. 2017
Источник: debian
EPSS Низкий

Описание

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemdfixed234-1package
systemdnot-affectedjessiepackage
systemdnot-affectedwheezypackage

Примечания

  • https://github.com/systemd/systemd/issues/6237

  • Fixed by: https://github.com/systemd/systemd/commit/bb28e68477a3a39796e4999a6cbc6ac6345a9159

  • https://www.openwall.com/lists/oss-security/2017/07/02/1

EPSS

Процентиль: 49%
0.00258
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

CVSS3: 7.2
redhat
больше 8 лет назад

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

CVSS3: 9.8
nvd
больше 8 лет назад

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

CVSS3: 9.8
github
больше 3 лет назад

systemd v233 and earlier fails to safely parse usernames starting with a numeric digit (e.g. "0day"), running the service in question with root privileges rather than the user intended.

CVSS3: 9.8
fstec
больше 8 лет назад

Уязвимость службы анализирования имен пользователей демона Systemd, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю запустить службу с root-привилегиями

EPSS

Процентиль: 49%
0.00258
Низкий