Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-2876

Опубликовано: 13 сент. 2005
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.

РелизСтатусПримечание
dapper

released

2.12r-1
devel

released

2.12r-1
edgy

released

2.12r-1
feisty

released

2.12r-1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.12r-4ubuntu6
devel

released

2.12r-4ubuntu6
edgy

released

2.12r-4ubuntu6
feisty

released

2.12r-4ubuntu6
upstream

needs-triage

Показывать по

EPSS

Процентиль: 14%
0.00048
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
почти 20 лет назад

umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.

nvd
почти 20 лет назад

umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.

debian
почти 20 лет назад

umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other ...

github
больше 3 лет назад

umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.

fstec
почти 20 лет назад

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 14%
0.00048
Низкий

7.2 High

CVSS2