Описание
NetBSD 1.6, NetBSD 2.0 through 2.1, and NetBSD-current before 20051031 allows local users to gain privileges by attaching a debugger to a setuid/setgid (P_SUGID) process that performs an exec without a reset of real credentials.
Ссылки
- Patch
- Vendor Advisory
- Patch
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:1.6.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.0.3:*:*:*:*:*:*:*
cpe:2.3:o:netbsd:netbsd:2.1:*:*:*:*:*:*:*
EPSS
Процентиль: 70%
0.00633
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
NetBSD 1.6, NetBSD 2.0 through 2.1, and NetBSD-current before 20051031 allows local users to gain privileges by attaching a debugger to a setuid/setgid (P_SUGID) process that performs an exec without a reset of real credentials.
EPSS
Процентиль: 70%
0.00633
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other