Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-34pj-cg9w-gxv3

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

EPSS

Процентиль: 17%
0.00056
Низкий

Связанные уязвимости

ubuntu
около 19 лет назад

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

nvd
около 19 лет назад

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

debian
около 19 лет назад

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called ...

EPSS

Процентиль: 17%
0.00056
Низкий