Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-7135

Опубликовано: 15 дек. 2013
Источник: redhat
CVSS2: 3.6
EPSS Низкий

Описание

The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Satellite 5.2perl-Proc-DaemonWill not fix
Red Hat Satellite 5.3perl-Proc-DaemonWill not fix
Red Hat Satellite 5.4perl-Proc-DaemonWill not fix

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=1043872perl-Proc-Daemon: writes pidfile with mode 666

EPSS

Процентиль: 10%
0.00036
Низкий

3.6 Low

CVSS2

Связанные уязвимости

ubuntu
около 12 лет назад

The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.

nvd
около 12 лет назад

The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.

debian
около 12 лет назад

The Proc::Daemon module 0.14 for Perl uses world-writable permissions ...

github
больше 3 лет назад

The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.

EPSS

Процентиль: 10%
0.00036
Низкий

3.6 Low

CVSS2