Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qg9p-phxf-4376

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.

The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.

EPSS

Процентиль: 33%
0.00126
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.

nvd
больше 18 лет назад

The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server 1.3.34-4 does not properly disassociate httpd from a controlling tty when httpd is started interactively, which allows local users to gain privileges to that tty via a CGI program that calls the TIOCSTI ioctl.

debian
больше 18 лет назад

The Debian GNU/Linux 033_-F_NO_SETSID patch for the Apache HTTP Server ...

EPSS

Процентиль: 33%
0.00126
Низкий