Описание
The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.
Ссылки
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- Vendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:gnu:mailman:2.0:beta3:*:*:*:*:*:*
cpe:2.3:a:gnu:mailman:2.0:beta4:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*
EPSS
Процентиль: 22%
0.00069
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
redhat
почти 25 лет назад
The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.
github
около 3 лет назад
The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.
EPSS
Процентиль: 22%
0.00069
Низкий
4.6 Medium
CVSS2
Дефекты
NVD-CWE-Other