Описание
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-0476
- https://security.gentoo.org/glsa/201709-05
- https://www.exploit-db.com/exploits/38775
- http://osvdb.org/show/osvdb/107710
- http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html
- http://www.chkrootkit.org
- http://www.debian.org/security/2014/dsa-2945
- http://www.openwall.com/lists/oss-security/2014/06/04/9
- http://www.ubuntu.com/usn/USN-2230-1
Связанные уязвимости
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.
The slapper function in chkrootkit before 0.50 does not properly quote ...