Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-45752

Опубликовано: 19 сент. 2024
Источник: debian
EPSS Низкий

Описание

logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
logiopsfixed0.3.5-1package
logiopsno-dsabookwormpackage

Примечания

  • https://bugzilla.suse.com/show_bug.cgi?id=1226598

  • https://github.com/PixlOne/logiops/issues/473

  • https://github.com/PixlOne/logiops/pull/476

  • https://github.com/PixlOne/logiops/commit/628ab937a25724c1f21e7edf25c8e5aaff82c691 (v0.3.5)

EPSS

Процентиль: 5%
0.00021
Низкий

Связанные уязвимости

CVSS3: 8.5
ubuntu
больше 1 года назад

logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction.

CVSS3: 8.5
nvd
больше 1 года назад

logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction.

CVSS3: 8.5
github
больше 1 года назад

logiops through 0.3.4, in its default configuration, allows any unprivileged user to configure its logid daemon via an unrestricted D-Bus service, including setting malicious keyboard macros. This allows for privilege escalation with minimal user interaction.

EPSS

Процентиль: 5%
0.00021
Низкий