Описание
The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.4.1-2+ubuntu0.1 |
devel | released | 1.4.2-6 |
edgy | ignored | end of life, was needed |
feisty | released | 1.4.2-6 |
gutsy | released | 1.4.2-6 |
hardy | released | 1.4.2-6 |
intrepid | released | 1.4.2-6 |
upstream | released | 1.4.4 |
Показывать по
Ссылки на источники
EPSS
7.5 High
CVSS2
Связанные уязвимости
The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x befo ...
The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache.
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.5 High
CVSS2