Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qqmr-fh23-w8vj

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.

SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.

EPSS

Процентиль: 73%
0.00778
Низкий

Связанные уязвимости

nvd
почти 30 лет назад

SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.

debian
почти 30 лет назад

SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding ho ...

EPSS

Процентиль: 73%
0.00778
Низкий