Описание
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.1.19.dfsg1-0.1ubuntu2 |
devel | released | 2.1.19.dfsg1-0.1ubuntu2 |
edgy | released | 2.1.19.dfsg1-0.1ubuntu2 |
feisty | released | 2.1.19.dfsg1-0.1ubuntu2 |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | DNE | |
devel | released | 2.1.22.dfsg1-12 |
edgy | DNE | |
feisty | DNE | |
upstream | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.1.19-2 |
devel | DNE | |
edgy | released | 2.1.19-2 |
feisty | released | 2.1.19-2 |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
7.2 High
CVSS2
Связанные уязвимости
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and ea ...
The (1) libsasl and (2) libsasl2 libraries in Cyrus-SASL 2.1.18 and earlier trust the SASL_PATH environment variable to find all available SASL plug-ins, which allows local users to execute arbitrary code by modifying the SASL_PATH to point to malicious programs.
Уязвимости операционной системы Debian GNU/Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.2 High
CVSS2