Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-1142

Опубликовано: 23 нояб. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.7

Описание

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

not-affected

code not present
esm-infra/xenial

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
kinetic

not-affected

code not present
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 17%
0.00053
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
redhat
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

CVSS3: 6.7
nvd
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

CVSS3: 6.7
debian
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local user ...

CVSS3: 6.7
github
около 3 лет назад

An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can gain privileges via a symlink attack on /tmp files if vmware-user-suid-wrapper is setuid root and the ChmodChownDirectory function is enabled.

EPSS

Процентиль: 17%
0.00053
Низкий

6.7 Medium

CVSS3