Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-5290

Опубликовано: 07 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 8.8

Описание

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

РелизСтатусПримечание
devel

released

2:2.10-22
esm-infra-legacy/trusty

released

2.1-0ubuntu1.7+esm5
esm-infra/bionic

released

2:2.6-15ubuntu2.8+esm1
esm-infra/focal

released

2:2.9-1ubuntu4.4
esm-infra/xenial

released

2.4-0ubuntu6.8+esm1
focal

released

2:2.9-1ubuntu4.4
jammy

released

2:2.10-6ubuntu2.1
mantic

ignored

end of life, was needs-triage
noble

released

2:2.10-21ubuntu0.1
trusty/esm

released

2.1-0ubuntu1.7+esm5

Показывать по

EPSS

Процентиль: 4%
0.00022
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 6.4
redhat
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

CVSS3: 8.8
nvd
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

CVSS3: 8.8
debian
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in load ...

CVSS3: 8.8
github
около 1 года назад

An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root). Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.

CVSS3: 8.8
fstec
больше 1 года назад

Уязвимость клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 4%
0.00022
Низкий

8.8 High

CVSS3