Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-4176

Опубликовано: 19 нояб. 2010
Источник: redhat
CVSS2: 4

Описание

plymouth-pretrigger.sh in dracut and udev, when running on Fedora 13 and 14, sets weak permissions for the /dev/systty device file, which allows remote authenticated users to read terminal data from tty0 for local users.

Отчет

Not vulnerable. This issue did not affect the versions of dracut as shipped with Red Hat Enterprise Linux 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6dracutNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=654489dracut: /dev/systty permissions could allow remote users to snoop on local users

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

plymouth-pretrigger.sh in dracut and udev, when running on Fedora 13 and 14, sets weak permissions for the /dev/systty device file, which allows remote authenticated users to read terminal data from tty0 for local users.

nvd
около 15 лет назад

plymouth-pretrigger.sh in dracut and udev, when running on Fedora 13 and 14, sets weak permissions for the /dev/systty device file, which allows remote authenticated users to read terminal data from tty0 for local users.

debian
около 15 лет назад

plymouth-pretrigger.sh in dracut and udev, when running on Fedora 13 a ...

github
больше 3 лет назад

plymouth-pretrigger.sh in dracut and udev, when running on Fedora 13 and 14, sets weak permissions for the /dev/systty device file, which allows remote authenticated users to read terminal data from tty0 for local users.

4 Medium

CVSS2