Описание
In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier.
Ссылки
- Product
- Vendor Advisory
- Product
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.11 (включая)Версия до 1.0.14 (включая)
Одно из
cpe:2.3:a:malwarebytes:endpoint_detection_and_response:*:*:*:*:*:linux:*:*
cpe:2.3:a:malwarebytes:malwarebytes:*:*:*:*:*:linux:*:*
EPSS
Процентиль: 1%
0.00012
Низкий
5.5 Medium
CVSS3
Дефекты
NVD-CWE-Other
CWE-290
Связанные уязвимости
CVSS3: 5.5
github
больше 2 лет назад
In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier.
EPSS
Процентиль: 1%
0.00012
Низкий
5.5 Medium
CVSS3
Дефекты
NVD-CWE-Other
CWE-290