Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q56m-rhvg-jwg2

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

EPSS

Процентиль: 30%
0.0011
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

redhat
почти 11 лет назад

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

nvd
почти 11 лет назад

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

debian
почти 11 лет назад

automount 5.0.8, when a program map uses certain interpreted languages ...

suse-cvrf
почти 11 лет назад

Security update for autofs

EPSS

Процентиль: 30%
0.0011
Низкий