Описание
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
Ссылки
- Broken Link
- Issue TrackingThird Party Advisory
- Third Party Advisory
- Broken Link
- Issue TrackingThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
EPSS
6.7 Medium
CVSS3
7.2 High
CVSS2
Дефекты
Связанные уязвимости
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check ...
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
EPSS
6.7 Medium
CVSS3
7.2 High
CVSS2