Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2013-1958

Опубликовано: 24 апр. 2013
Источник: nvd
CVSS2: 1.9
EPSS Низкий

Описание

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Версия до 3.8.5 (включая)
cpe:2.3:o:linux:linux_kernel:3.8.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.8.4:*:*:*:*:*:*:*

EPSS

Процентиль: 12%
0.00039
Низкий

1.9 Low

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
почти 13 лет назад

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

debian
почти 13 лет назад

The scm_check_creds function in net/core/scm.c in the Linux kernel bef ...

github
больше 3 лет назад

The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.

EPSS

Процентиль: 12%
0.00039
Низкий

1.9 Low

CVSS2

Дефекты

CWE-264