Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7358

Опубликовано: 05 апр. 2017
Источник: debian
EPSS Низкий

Описание

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lightdmnot-affectedpackage

Примечания

  • https://launchpad.net/bugs/1677924

  • Specific script debian/guest-account.sh not merged from Ubuntu

EPSS

Процентиль: 82%
0.01737
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
почти 9 лет назад

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

CVSS3: 7.3
nvd
почти 9 лет назад

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

CVSS3: 7.3
github
больше 3 лет назад

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

EPSS

Процентиль: 82%
0.01737
Низкий