Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-67qg-fr69-72wp

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

EPSS

Процентиль: 27%
0.00091
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

debian
больше 23 лет назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, ...

EPSS

Процентиль: 27%
0.00091
Низкий