Описание
An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.4.161.8859r (включая)
cpe:2.3:o:pax:prolinos:*:*:*:*:*:*:*:*
EPSS
Процентиль: 29%
0.00104
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.
EPSS
Процентиль: 29%
0.00104
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269