Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-8169

Опубликовано: 18 мар. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4

Описание

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

РелизСтатусПримечание
devel

released

5.0.8-1ubuntu3
esm-infra-legacy/trusty

not-affected

5.0.7-3ubuntu3.1
lucid

DNE

precise

DNE

trusty

not-affected

5.0.7-3ubuntu3.1
trusty/esm

not-affected

5.0.7-3ubuntu3.1
upstream

needed

utopic

released

5.0.8-1ubuntu1.1
vivid

released

5.0.8-1ubuntu3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

5.0.4-3.1ubuntu5.1
precise

not-affected

5.0.6-0ubuntu5.2
trusty

DNE

trusty/esm

DNE

upstream

needed

utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 30%
0.0011
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

nvd
больше 10 лет назад

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

debian
больше 10 лет назад

automount 5.0.8, when a program map uses certain interpreted languages ...

suse-cvrf
больше 10 лет назад

Security update for autofs

github
больше 3 лет назад

automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.

EPSS

Процентиль: 30%
0.0011
Низкий

4.4 Medium

CVSS2