Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-24331

Опубликовано: 13 авг. 2020
Источник: ubuntu
Приоритет: negligible
EPSS Низкий
CVSS2: 7.2
CVSS3: 7.8

Описание

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

0.3.15-0.3
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

not-affected

0.3.15-0.2
esm-apps/noble

not-affected

0.3.15-0.3
esm-infra-legacy/trusty

DNE

esm-infra/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 41%
0.00191
Низкий

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
почти 5 лет назад

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).

CVSS3: 7.8
nvd
почти 5 лет назад

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).

CVSS3: 7.8
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 7.8
debian
почти 5 лет назад

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon ...

CVSS3: 7.8
github
около 3 лет назад

An issue was discovered in TrouSerS through 0.3.14. If the tcsd daemon is started with root privileges, the tss user still has read and write access to the /etc/tcsd.conf file (which contains various settings related to this daemon).

EPSS

Процентиль: 41%
0.00191
Низкий

7.2 High

CVSS2

7.8 High

CVSS3