Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-37705

Опубликовано: 16 апр. 2023
Источник: nvd
CVSS3: 6.7
EPSS Низкий

Описание

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:zmanda:amanda:3.5.1:*:*:*:*:*:*:*

EPSS

Процентиль: 87%
0.03372
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-88

Связанные уязвимости

CVSS3: 6.7
ubuntu
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
redhat
около 3 лет назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
debian
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the bac ...

CVSS3: 7.8
github
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

suse-cvrf
почти 3 года назад

Security update for amanda

EPSS

Процентиль: 87%
0.03372
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-88