Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-5076

Опубликовано: 02 нояб. 2008
Источник: redhat
EPSS Низкий

Описание

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=471952htop does not filter non-printable characters in process names

EPSS

Процентиль: 16%
0.00067
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

nvd
около 17 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

debian
около 17 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-pri ...

github
больше 3 лет назад

htop 0.7 writes process names to a terminal without sanitizing non-printable characters, which might allow local users to hide processes, modify arbitrary files, or have unspecified other impact via a process name with "crazy control strings."

EPSS

Процентиль: 16%
0.00067
Низкий