Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-3632

Опубликовано: 07 окт. 2014
Источник: nvd
CVSS2: 7.6
EPSS Низкий

Описание

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:openstack:neutron:*:*:*:*:*:*:*:*
Версия от 2014.1 (включая) до 2014.1.2 (включая)

EPSS

Процентиль: 79%
0.0122
Низкий

7.6 High

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
больше 11 лет назад

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

redhat
больше 11 лет назад

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

debian
больше 11 лет назад

The default configuration in a sudoers file in the Red Hat openstack-n ...

github
больше 3 лет назад

The default configuration in a sudoers file in the Red Hat openstack-neutron package before 2014.1.2-4, as used in Red Hat Enterprise Linux Open Stack Platform 5.0 for Red Hat Enterprise Linux 6, allows remote attackers to gain privileges via a crafted configuration file. NOTE: this vulnerability exists because of a CVE-2013-6433 regression.

EPSS

Процентиль: 79%
0.0122
Низкий

7.6 High

CVSS2

Дефекты

CWE-264