Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-45770

Опубликовано: 19 сент. 2024
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pcpfixed6.3.1-1package
pcpno-dsabookwormpackage
pcpignoredbullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2310451

  • https://www.openwall.com/lists/oss-security/2024/09/20/1

  • Fixed by: https://github.com/performancecopilot/pcp/commit/22505f9a43c212217d4d53200dcf2f0e94febc8f (6.3.1)

EPSS

Процентиль: 16%
0.0005
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
9 месяцев назад

A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.

CVSS3: 4.4
redhat
9 месяцев назад

A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.

CVSS3: 4.4
nvd
9 месяцев назад

A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.

CVSS3: 4.4
msrc
около 1 месяца назад

Описание отсутствует

CVSS3: 4.4
github
9 месяцев назад

A vulnerability was found in Performance Co-Pilot (PCP). This flaw can only be exploited if an attacker has access to a compromised PCP system account. The issue is related to the pmpost tool, which is used to log messages in the system. Under certain conditions, it runs with high-level privileges.

EPSS

Процентиль: 16%
0.0005
Низкий