Описание
The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-7098
- https://exchange.xforce.ibmcloud.com/vulnerabilities/32708
- http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0579.html
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357561
- http://osvdb.org/33816
- http://secunia.com/advisories/24324
- http://www.securityfocus.com/bid/22732
EPSS
CVE ID
Связанные уязвимости
The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.
The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server ...
EPSS