Описание
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.1a15-1.2 |
hardy | ignored | end of life |
lucid | released | 2.1a15-1.1+squeeze1build0.10.04.1 |
natty | released | 2.1a15-1.1+squeeze1build0.11.04.1 |
oneiric | released | 2.1a15-1.1+squeeze1build0.11.10.1 |
precise | released | 2.1a15-1.1+squeeze1build0.12.04.1 |
upstream | released | 2.1a15-1.2 |
Показывать по
Ссылки на источники
10 Critical
CVSS2
Связанные уязвимости
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly othe ...
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
10 Critical
CVSS2