Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0301

Опубликовано: 04 фев. 2010
Источник: ubuntu
Приоритет: medium
CVSS2: 6.9

Описание

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

2.7.1-1
dapper

ignored

end of life
devel

not-affected

2.7.1-1
esm-apps/bionic

not-affected

2.7.1-1
esm-apps/xenial

not-affected

2.7.1-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [2.7.1-1]]
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life

Показывать по

6.9 Medium

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

nvd
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

debian
почти 16 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d opt ...

github
больше 3 лет назад

main.C in maildrop 2.3.0 and earlier, when run by root with the -d option, uses the gid of root for execution of the .mailfilter file in a user's home directory, which allows local users to gain privileges via a crafted file.

6.9 Medium

CVSS2