Описание
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2017-7358
- https://launchpad.net/bugs/1677924
- https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html
- https://www.exploit-db.com/exploits/41923
- https://www.ubuntu.com/usn/usn-3255-1
- http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478
- http://www.securityfocus.com/bid/97486
Связанные уязвимости
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
In LightDM through 1.22.0, a directory traversal issue in debian/guest ...