Логотип exploitDog
bind:"CVE-2023-6917"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-6917"

Количество 12

Количество 12

ubuntu логотип

CVE-2023-6917

больше 1 года назад

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
EPSS: Низкий
redhat логотип

CVE-2023-6917

больше 1 года назад

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2023-6917

больше 1 года назад

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
EPSS: Низкий
debian логотип

CVE-2023-6917

больше 1 года назад

A vulnerability has been identified in the Performance Co-Pilot (PCP) ...

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0801-1

4 месяца назад

Security update for pcp

EPSS: Низкий
github логотип

GHSA-pgw3-qmf6-36m3

больше 1 года назад

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
EPSS: Низкий
oracle-oval логотип

ELSA-2024-2213

около 1 года назад

ELSA-2024-2213: pcp security update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2024-06871

больше 1 года назад

Уязвимость программного обеспечения мониторинга и визуализация производительности Performance Co-Pilot (PCP), связанная с cозданием временного файла с небезопасными разрешениями, позволяющая нарушителю выполнить атаку с использованием символических ссылок и нарушить изоляцию пользователя PCP

CVSS3: 6
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3785-1

8 месяцев назад

Security update for pcp

EPSS: Низкий
redos логотип

ROS-20240904-14

10 месяцев назад

Множественные уязвимости pcp

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3976-1

8 месяцев назад

Security update for pcp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3533-1

9 месяцев назад

Security update for pcp

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-6917

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2023-6917

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2023-6917

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-6917

A vulnerability has been identified in the Performance Co-Pilot (PCP) ...

CVSS3: 6
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0801-1

Security update for pcp

0%
Низкий
4 месяца назад
github логотип
GHSA-pgw3-qmf6-36m3

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group privileges, others are granted full root privileges. This disparity in privilege levels poses a risk when privileged root processes interact with directories or directory trees owned by unprivileged PCP users. Specifically, this vulnerability may lead to the compromise of PCP user isolation and facilitate local PCP-to-root exploits, particularly through symlink attacks. These vulnerabilities underscore the importance of maintaining robust privilege separation mechanisms within PCP to mitigate the potential for unauthorized privilege escalation.

CVSS3: 6
0%
Низкий
больше 1 года назад
oracle-oval логотип
ELSA-2024-2213

ELSA-2024-2213: pcp security update (MODERATE)

около 1 года назад
fstec логотип
BDU:2024-06871

Уязвимость программного обеспечения мониторинга и визуализация производительности Performance Co-Pilot (PCP), связанная с cозданием временного файла с небезопасными разрешениями, позволяющая нарушителю выполнить атаку с использованием символических ссылок и нарушить изоляцию пользователя PCP

CVSS3: 6
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3785-1

Security update for pcp

8 месяцев назад
redos логотип
ROS-20240904-14

Множественные уязвимости pcp

CVSS3: 9.8
10 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3976-1

Security update for pcp

8 месяцев назад
suse-cvrf логотип
SUSE-SU-2024:3533-1

Security update for pcp

9 месяцев назад

Уязвимостей на страницу