Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3p48-pw9r-4325

Опубликовано: 21 апр. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

EPSS

Процентиль: 38%
0.00163
Низкий

7.8 High

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

redhat
около 21 года назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

CVSS3: 7.8
nvd
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

CVSS3: 7.8
debian
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo ...

EPSS

Процентиль: 38%
0.00163
Низкий

7.8 High

CVSS3

Дефекты

CWE-20