Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-10699

Опубликовано: 15 апр. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
targetcli-fbnot-affectedpackage

Примечания

  • https://github.com/open-iscsi/targetcli-fb/issues/162

  • Introduced in: https://github.com/open-iscsi/targetcli-fb/commit/ad37f94ae72d0e3d5963ce182e2897c84af9c039 (v2.1.50)

  • Fixed by: https://github.com/open-iscsi/targetcli-fb/commit/6e4f39357a90a914d11bac21cc2d2b52c07c213d

EPSS

Процентиль: 34%
0.00137
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 6 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

CVSS3: 7.8
redhat
почти 6 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

CVSS3: 7.8
nvd
почти 6 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

CVSS3: 7.8
github
больше 3 лет назад

A flaw was found in Linux, in targetcli-fb versions 2.1.50 and 2.1.51 where the socket used by targetclid was world-writable. If a system enables the targetclid socket, a local attacker can use this flaw to modify the iSCSI configuration and escalate their privileges to root.

oracle-oval
почти 6 лет назад

ELSA-2020-1933: targetcli security update (IMPORTANT)

EPSS

Процентиль: 34%
0.00137
Низкий