Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qhrh-3jj7-5jgg

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

EPSS

Процентиль: 34%
0.00177
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

nvd
больше 19 лет назад

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 inadvertently treats the address of the geteuid function as if it is the return value of a call to geteuid, which allows local users to bypass intended restrictions and (1) execute arbitrary code via the -modulepath command line option or (2) overwrite arbitrary files via -logfile.

debian
больше 19 лет назад

X.Org server (xorg-server) 1.0.0 and later, X11R6.9.0, and X11R7.0 ina ...

EPSS

Процентиль: 34%
0.00177
Низкий