Описание
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.
Ссылки
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- Vendor Advisory
- ExploitMailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- Vendor Advisory
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:o:openbsd:openbsd:6.6:*:*:*:*:*:*:*
EPSS
Процентиль: 42%
0.00198
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-732
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.
EPSS
Процентиль: 42%
0.00198
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-732