Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6w36-rjfw-vf62

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

EPSS

Процентиль: 32%
0.00121
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 15 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

redhat
почти 15 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

nvd
почти 15 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.

debian
почти 15 лет назад

The open_log function in log.c in Exim 4.72 and earlier does not check ...

EPSS

Процентиль: 32%
0.00121
Низкий

Дефекты

CWE-20