Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-5899

Опубликовано: 27 мар. 2017
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 6.9
CVSS3: 7

Описание

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

РелизСтатусПримечание
artful

not-affected

14.8.16-1
bionic

not-affected

14.8.16-1
cosmic

not-affected

14.8.16-1
devel

not-affected

14.8.16-1
disco

not-affected

14.8.16-1
eoan

not-affected

14.8.16-1
esm-apps/bionic

not-affected

14.8.16-1
esm-apps/focal

not-affected

14.8.16-1
esm-apps/jammy

not-affected

14.8.16-1
esm-apps/xenial

released

14.8.6-1ubuntu0.1~esm1

Показывать по

EPSS

Процентиль: 71%
0.00696
Низкий

6.9 Medium

CVSS2

7 High

CVSS3

Связанные уязвимости

CVSS3: 7
redhat
около 9 лет назад

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

CVSS3: 7
nvd
почти 9 лет назад

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

CVSS3: 7
debian
почти 9 лет назад

Directory traversal vulnerability in the setuid root helper binary in ...

CVSS3: 7
github
больше 3 лет назад

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

EPSS

Процентиль: 71%
0.00696
Низкий

6.9 Medium

CVSS2

7 High

CVSS3