Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3215

Опубликовано: 08 мая 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.9

Описание

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

РелизСтатусПримечание
devel

not-affected

esm-apps/xenial

not-affected

esm-infra-legacy/trusty

not-affected

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
quantal

not-affected

saucy

not-affected

trusty

not-affected

trusty/esm

not-affected

Показывать по

EPSS

Процентиль: 8%
0.00033
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

nvd
около 11 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

debian
около 11 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissi ...

suse-cvrf
больше 8 лет назад

Security update for libcap-ng

github
около 3 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

EPSS

Процентиль: 8%
0.00033
Низкий

6.9 Medium

CVSS2