Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hcmv-4364-jhrx

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

EPSS

Процентиль: 25%
0.00089
Низкий

Связанные уязвимости

nvd
около 22 лет назад

SCO UnixWare 7.1.1, 7.1.3, and Open UNIX 8.0.0 allows local users to bypass protections for the "as" address space file for a process ID (PID) by obtaining a procfs file descriptor for the file and calling execve() on a setuid or setgid program, which leaves the descriptor open to the user.

EPSS

Процентиль: 25%
0.00089
Низкий