Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-7358

Опубликовано: 05 апр. 2017
Источник: ubuntu
Приоритет: high
CVSS2: 6.9
CVSS3: 7.3

Описание

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

РелизСтатусПримечание
devel

released

1.22.0-0ubuntu2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
esm-infra/xenial

released

1.18.3-0ubuntu1.1
precise

not-affected

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

needed

vivid/stable-phone-overlay

not-affected

vivid/ubuntu-core

DNE

xenial

released

1.18.3-0ubuntu1.1

Показывать по

6.9 Medium

CVSS2

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
почти 9 лет назад

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

CVSS3: 7.3
debian
почти 9 лет назад

In LightDM through 1.22.0, a directory traversal issue in debian/guest ...

CVSS3: 7.3
github
больше 3 лет назад

In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.

6.9 Medium

CVSS2

7.3 High

CVSS3