Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w2mw-45j6-m2cq

Опубликовано: 14 авг. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

GNU inetutils through 2.4 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

GNU inetutils through 2.4 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

EPSS

Процентиль: 14%
0.00046
Низкий

7.8 High

CVSS3

Дефекты

CWE-252

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

CVSS3: 7.8
nvd
больше 2 лет назад

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

CVSS3: 7.8
debian
больше 2 лет назад

GNU inetutils before 2.5 may allow privilege escalation because of unc ...

EPSS

Процентиль: 14%
0.00046
Низкий

7.8 High

CVSS3

Дефекты

CWE-252