Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-10729

Опубликовано: 11 янв. 2016
Источник: redhat
CVSS3: 4.2

Описание

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5amandaWill not fix
Red Hat Enterprise Linux 6amandaWill not fix
Red Hat Enterprise Linux 7amandaOut of support scope
Red Hat Enterprise Linux 8amandaNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1647084amanda: Privilege escalation in runtar via --rsh-command option

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

CVSS3: 7.8
nvd
больше 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges can trivially compromise a client installation. The "runtar" setuid root binary does not check for additional arguments supplied after --create, allowing users to manipulate commands and perform command injection as root.

CVSS3: 7.8
debian
больше 7 лет назад

An issue was discovered in Amanda 3.3.1. A user with backup privileges ...

suse-cvrf
около 7 лет назад

Security update for amanda

suse-cvrf
около 7 лет назад

Security update for amanda

4.2 Medium

CVSS3