Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-52gf-7jph-c2gx

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

EPSS

Процентиль: 80%
0.01381
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

nvd
почти 19 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.

debian
почти 19 лет назад

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x befo ...

fstec
почти 19 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 80%
0.01381
Низкий