Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f6jc-6vm7-jv5m

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

EPSS

Процентиль: 93%
0.11441
Средний

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 11 лет назад

The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

nvd
больше 11 лет назад

The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

debian
больше 11 лет назад

The slapper function in chkrootkit before 0.50 does not properly quote ...

EPSS

Процентиль: 93%
0.11441
Средний

Дефекты

CWE-20