Описание
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
A flaw was found in the readline.sh script of Socat through version 1.8.0.1. This vulnerability can allow attackers to exploit improper use of a predictable temporary file.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 7 | socat | Out of support scope | ||
Red Hat Enterprise Linux 8 | socat | Affected | ||
Red Hat Enterprise Linux 9 | socat | Affected | ||
Red Hat OpenShift Container Platform 4 | rhcos | Fix deferred |
Показывать по
10
Дополнительная информация
Статус:
Moderate
Дефект:
CWE-377
https://bugzilla.redhat.com/show_bug.cgi?id=2330297socat: arbitrary file overwrite via predictable /tmp directory
EPSS
Процентиль: 31%
0.00115
Низкий
5.3 Medium
CVSS3
Связанные уязвимости
CVSS3: 9.8
ubuntu
7 месяцев назад
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
CVSS3: 9.8
nvd
7 месяцев назад
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 file.
CVSS3: 9.8
debian
7 месяцев назад
readline.sh in socat before1.8.0.2 relies on the /tmp/$USER/stderr2 fi ...
EPSS
Процентиль: 31%
0.00115
Низкий
5.3 Medium
CVSS3