Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jp7r-rjgx-vrh4

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and when the agent is bound to 0.0.0.0 (all interfaces), opens sockets in non-exclusive mode, which allows local users to hijack the socket, and capture data or cause a denial of service (loss of daemon operation).

FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and when the agent is bound to 0.0.0.0 (all interfaces), opens sockets in non-exclusive mode, which allows local users to hijack the socket, and capture data or cause a denial of service (loss of daemon operation).

EPSS

Процентиль: 28%
0.00099
Низкий

Связанные уязвимости

nvd
около 19 лет назад

FRAgent.exe in Mandiant First Response (MFR) before 1.1.1, when run in daemon mode and when the agent is bound to 0.0.0.0 (all interfaces), opens sockets in non-exclusive mode, which allows local users to hijack the socket, and capture data or cause a denial of service (loss of daemon operation).

EPSS

Процентиль: 28%
0.00099
Низкий