Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7mg2-6qgr-3p64

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

EPSS

Процентиль: 16%
0.00051
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

redhat
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

nvd
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

debian
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d opt ...

EPSS

Процентиль: 16%
0.00051
Низкий