Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3842

Опубликовано: 09 апр. 2019
Источник: debian
EPSS Низкий

Описание

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

Пакеты

ПакетСтатусВерсия исправленияРелизТип
systemdfixed241-3package

Примечания

  • https://bugs.chromium.org/p/project-zero/issues/detail?id=1756

  • https://bugs.launchpad.net/bugs/1812316

  • https://github.com/systemd/systemd/commit/83d4ab55336ff8a0643c6aa627b31e351a24040a

EPSS

Процентиль: 28%
0.001
Низкий

Связанные уязвимости

CVSS3: 7
ubuntu
больше 6 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 4.5
redhat
больше 6 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
nvd
больше 6 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
msrc
больше 5 лет назад

Описание отсутствует

CVSS3: 7
github
больше 3 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

EPSS

Процентиль: 28%
0.001
Низкий