Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-7572

Опубликовано: 06 апр. 2017
Источник: nvd
CVSS3: 8.1
CVSS2: 9.3
EPSS Низкий

Описание

The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc//status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:backintime_project:backintime:*:*:*:*:*:*:*:*
Версия до 1.1.18 (включая)

EPSS

Процентиль: 70%
0.00649
Низкий

8.1 High

CVSS3

9.3 Critical

CVSS2

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 9 лет назад

The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc/<pid>/status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.

CVSS3: 8.1
debian
почти 9 лет назад

The _checkPolkitPrivilege function in serviceHelper.py in Back In Time ...

suse-cvrf
почти 9 лет назад

Security update for backintime

CVSS3: 8.1
github
больше 3 лет назад

The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc/<pid>/status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.

EPSS

Процентиль: 70%
0.00649
Низкий

8.1 High

CVSS3

9.3 Critical

CVSS2

Дефекты

CWE-362