Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-27830

Опубликовано: 12 апр. 2023
Источник: debian

Описание

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tightvncnot-affectedpackage

Примечания

  • https://medium.com/nestedif/vulnerability-disclosure-privilege-escalation-tightvnc-8165208cce

Связанные уязвимости

CVSS3: 9
ubuntu
почти 3 года назад

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.

CVSS3: 9
nvd
почти 3 года назад

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.

CVSS3: 9
github
почти 3 года назад

TightVNC before v2.8.75 allows attackers to escalate privileges on the host operating system via replacing legitimate files with crafted files when executing a file transfer. This is due to the fact that TightVNC runs in the backend as a high-privileges account.

CVSS3: 9
fstec
почти 3 года назад

Уязвимость системы удалённого доступа к рабочему столу компьютера TightVNC, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии