Описание
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
Ссылки
- ExploitMailing ListThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Mailing ListPatchThird Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Mailing ListPatchThird Party Advisory
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
EPSS
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
Связанные уязвимости
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user it fails to drop the root gid privilege when no longer needed.
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon ...
EPSS
7.8 High
CVSS3
7.2 High
CVSS2