Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pgc9-m6j3-4cr6

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

EPSS

Процентиль: 19%
0.00061
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

nvd
больше 15 лет назад

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.

debian
больше 15 лет назад

The (1) teamspeak and (2) teamspeak-server scripts in TeamSpeak 2.0.32 ...

EPSS

Процентиль: 19%
0.00061
Низкий