Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5899

Опубликовано: 27 мар. 2017
Источник: debian
EPSS Низкий

Описание

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
s-nailfixed14.8.16-1package

Примечания

  • https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html

  • https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f797c27efecad45af191c518b7f87fda32ada160

  • https://git.sdaoden.eu/cgit/s-nail.git/commit/?id=f2699449b66dd702a98925bd1b11153a6f7294bf

  • https://www.openwall.com/lists/oss-security/2017/01/27/7

EPSS

Процентиль: 71%
0.00696
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
почти 9 лет назад

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

CVSS3: 7
redhat
около 9 лет назад

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

CVSS3: 7
nvd
почти 9 лет назад

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

CVSS3: 7
github
больше 3 лет назад

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

EPSS

Процентиль: 71%
0.00696
Низкий