Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rq5v-5f8w-q4j4

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

EPSS

Процентиль: 14%
0.00047
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

nvd
больше 20 лет назад

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

debian
больше 20 лет назад

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allow ...

EPSS

Процентиль: 14%
0.00047
Низкий