Описание
A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1:3.5.1-1ubuntu0.3 |
| devel | released | 1:3.5.1-11 |
| esm-apps/bionic | released | 1:3.5.1-1ubuntu0.3 |
| esm-apps/focal | released | 1:3.5.1-2ubuntu0.3 |
| esm-apps/jammy | released | 1:3.5.1-8ubuntu1.3 |
| esm-apps/xenial | ignored | regressions likely |
| focal | released | 1:3.5.1-2ubuntu0.3 |
| jammy | released | 1:3.5.1-8ubuntu1.3 |
| kinetic | released | 1:3.5.1-9ubuntu0.3 |
| lunar | released | 1:3.5.1-11 |
Показывать по
EPSS
6.7 Medium
CVSS3
Связанные уязвимости
A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),
A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),
A privilege escalation flaw was found in Amanda 3.5.1 in which the bac ...
A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),
EPSS
6.7 Medium
CVSS3