Описание
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
Ссылки
- ExploitMailing ListThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Mailing ListPatchThird Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitIssue TrackingThird Party Advisory
- Mailing ListPatchThird Party Advisory
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.3.14 (включая)
cpe:2.3:a:trousers_project:trousers:*:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
EPSS
Процентиль: 16%
0.00052
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269
Связанные уязвимости
CVSS3: 7.8
ubuntu
почти 5 лет назад
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
CVSS3: 7.8
redhat
почти 5 лет назад
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges instead of by the tss user, it fails to drop the root gid privilege when no longer needed.
CVSS3: 7.8
debian
почти 5 лет назад
An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon ...
EPSS
Процентиль: 16%
0.00052
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269