Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f6f6-98vp-w8mf

Опубликовано: 16 апр. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

EPSS

Процентиль: 87%
0.03372
Низкий

7.8 High

CVSS3

Дефекты

CWE-88

Связанные уязвимости

CVSS3: 6.7
ubuntu
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
redhat
около 3 лет назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
nvd
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
debian
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the bac ...

suse-cvrf
почти 3 года назад

Security update for amanda

EPSS

Процентиль: 87%
0.03372
Низкий

7.8 High

CVSS3

Дефекты

CWE-88