Описание
The replay-sorcery program in ReplaySorcery 0.4.0 through 0.5.0, when using the default setuid-root configuration, allows a local attacker to escalate privileges to root by specifying video output paths in privileged locations.
Ссылки
- ExploitMailing ListPatchThird Party Advisory
- Release NotesThird Party Advisory
- ExploitMailing ListPatchThird Party Advisory
- Release NotesThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 0.4.0 (включая) до 0.5.0 (включая)
cpe:2.3:a:replaysorcery_project:replaysorcery:*:*:*:*:*:*:*:*
EPSS
Процентиль: 9%
0.00032
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269
Связанные уязвимости
github
больше 3 лет назад
The replay-sorcery program in ReplaySorcery 0.4.0 through 0.5.0, when using the default setuid-root configuration, allows a local attacker to escalate privileges to root by specifying video output paths in privileged locations.
EPSS
Процентиль: 9%
0.00032
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-269