Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-37705

Опубликовано: 16 апр. 2023
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS3: 6.7

Описание

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

РелизСтатусПримечание
bionic

released

1:3.5.1-1ubuntu0.3
devel

released

1:3.5.1-11
esm-apps/bionic

released

1:3.5.1-1ubuntu0.3
esm-apps/focal

released

1:3.5.1-2ubuntu0.3
esm-apps/jammy

released

1:3.5.1-8ubuntu1.3
esm-apps/xenial

ignored

regressions likely
focal

released

1:3.5.1-2ubuntu0.3
jammy

released

1:3.5.1-8ubuntu1.3
kinetic

released

1:3.5.1-9ubuntu0.3
lunar

released

1:3.5.1-11

Показывать по

EPSS

Процентиль: 87%
0.03372
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
redhat
около 3 лет назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
nvd
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
debian
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the bac ...

CVSS3: 7.8
github
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

suse-cvrf
почти 3 года назад

Security update for amanda

EPSS

Процентиль: 87%
0.03372
Низкий

6.7 Medium

CVSS3