Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rq5v-5f8w-q4j4

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

EPSS

Процентиль: 15%
0.00047
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

nvd
почти 21 год назад

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allows local users to bypass access restrictions and load an arbitrary configuration file by starting an suid process and pointing the fcronsighup configuration file to a /proc entry that is owned by root but modifiable by the user, such as /proc/self/cmdline or /proc/self/environ.

debian
почти 21 год назад

fcronsighup in Fcron 2.0.1, 2.9.4, and possibly earlier versions allow ...

EPSS

Процентиль: 15%
0.00047
Низкий