Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-3490

Опубликовано: 09 янв. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 9
CVSS3: 8.8

Описание

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

РелизСтатусПримечание
devel

not-affected

7.8.2~dfsg.1-1+deb7u1
hardy

DNE

lucid

ignored

end of life
natty

ignored

end of life
oneiric

ignored

end of life
precise

DNE

quantal

not-affected

7.8.2~dfsg.1-1+deb7u1
raring

not-affected

7.8.2~dfsg.1-1+deb7u1
saucy

not-affected

7.8.2~dfsg.1-1+deb7u1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 83%
0.01956
Низкий

9 Critical

CVSS2

8.8 High

CVSS3

Связанные уязвимости

redhat
больше 13 лет назад

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

CVSS3: 8.8
nvd
около 6 лет назад

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

CVSS3: 8.8
debian
около 6 лет назад

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils ...

github
почти 4 года назад

The (1) my_popenv_impl and (2) my_spawnv functions in src/condor_utils/my_popen.cpp and the (3) systemCommand function in condor_vm-gahp/vmgahp_common.cpp in Condor 7.6.x before 7.6.10 and 7.8.x before 7.8.4 does not properly check the return value of setuid calls, which might cause a subprocess to be created with root privileges and allow remote attackers to gain privileges via unspecified vectors.

EPSS

Процентиль: 83%
0.01956
Низкий

9 Critical

CVSS2

8.8 High

CVSS3