Описание
beep version 1.3 and up contains a External Control of File Name or Path vulnerability in --device option that can result in Local unprivileged user can inhibit execution of arbitrary programs by other users, allowing DoS. This attack appear to be exploitable via The system must allow local users to run beep.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| beep | fixed | 1.4.3-1 | package | |
| beep | no-dsa | stretch | package | |
| beep | no-dsa | jessie | package |
Примечания
https://github.com/johnath/beep/issues/11#issuecomment-379514298
https://github.com/spkr-beep/beep/commit/10cd5126f320154dccf344e19248c5589d9c20bb
Связанные уязвимости
beep version 1.3 and up contains a External Control of File Name or Path vulnerability in --device option that can result in Local unprivileged user can inhibit execution of arbitrary programs by other users, allowing DoS. This attack appear to be exploitable via The system must allow local users to run beep.
beep version 1.3 and up contains a External Control of File Name or Path vulnerability in --device option that can result in Local unprivileged user can inhibit execution of arbitrary programs by other users, allowing DoS. This attack appear to be exploitable via The system must allow local users to run beep.
beep version 1.3 and up contains a External Control of File Name or Path vulnerability in --device option that can result in Local unprivileged user can inhibit execution of arbitrary programs by other users, allowing DoS. This attack appear to be exploitable via The system must allow local users to run beep.
Уязвимость утилиты для вывода звуковых сигналов посредством встроенного динамика компьютера beep, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю вызвать отказ в обслуживании