Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-10729

Опубликовано: 11 янв. 2016
Источник: redhat
CVSS3: 4.2
EPSS Низкий

Описание

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5amandaWill not fix
Red Hat Enterprise Linux 6amandaWill not fix
Red Hat Enterprise Linux 7amandaOut of support scope
Red Hat Enterprise Linux 8amandaNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1647084amanda: Privilege escalation in runtar via --rsh-command option

EPSS

Процентиль: 44%
0.00213
Низкий

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

CVSS3: 7.8
nvd
почти 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

CVSS3: 7.8
debian
почти 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges ...

suse-cvrf
больше 6 лет назад

Security update for amanda

suse-cvrf
больше 6 лет назад

Security update for amanda

EPSS

Процентиль: 44%
0.00213
Низкий

4.2 Medium

CVSS3