Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-40303

Опубликовано: 14 авг. 2023
Источник: nvd
CVSS3: 7.8
EPSS Низкий

Описание

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*
Версия до 2.4 (включая)

EPSS

Процентиль: 14%
0.00046
Низкий

7.8 High

CVSS3

Дефекты

CWE-252

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

CVSS3: 7.8
debian
больше 2 лет назад

GNU inetutils before 2.5 may allow privilege escalation because of unc ...

CVSS3: 7.8
github
больше 2 лет назад

GNU inetutils through 2.4 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

EPSS

Процентиль: 14%
0.00046
Низкий

7.8 High

CVSS3

Дефекты

CWE-252