Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-31256

Опубликовано: 26 окт. 2022
Источник: debian
EPSS Низкий

Описание

A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sendmailnot-affectedpackage

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=1204696

EPSS

Процентиль: 33%
0.00128
Низкий

Связанные уязвимости

CVSS3: 7.7
nvd
больше 3 лет назад

A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1.

suse-cvrf
больше 3 лет назад

Security update for sendmail

suse-cvrf
больше 3 лет назад

Security update for sendmail

CVSS3: 7.8
github
больше 3 лет назад

A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1.

EPSS

Процентиль: 33%
0.00128
Низкий