Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-20373

Опубликовано: 09 янв. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 7.2
CVSS3: 7.8

Описание

LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

disco

ignored

end of life
eoan

ignored

end of life
esm-apps/bionic

needs-triage

esm-apps/focal

released

2:2.18.06-1+deb10u1build0.20.04.1
esm-apps/xenial

needs-triage

esm-infra-legacy/trusty

DNE

focal

released

2:2.18.06-1+deb10u1build0.20.04.1
groovy

ignored

end of life

Показывать по

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
около 6 лет назад

LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.

CVSS3: 7.8
debian
около 6 лет назад

LTSP LDM through 2.18.06 allows fat-client root access because the LDM ...

github
больше 3 лет назад

LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script.

CVSS3: 7.8
fstec
около 6 лет назад

Уязвимость сценария run-x-session пакета LDM операционной системы Debian GNU/Linux, позволяющая нарушителю повысить свои привилегии до уровня суперпользователя

7.2 High

CVSS2

7.8 High

CVSS3