Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-52gf-7jph-c2gx

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

EPSS

Процентиль: 79%
0.01327
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

nvd
больше 18 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

debian
больше 18 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x befo ...

fstec
больше 18 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 79%
0.01327
Низкий