Логотип exploitDog
bind:"CVE-2019-3842"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-3842"

Количество 13

Количество 13

ubuntu логотип

CVE-2019-3842

больше 6 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
EPSS: Низкий
redhat логотип

CVE-2019-3842

больше 6 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 4.5
EPSS: Низкий
nvd логотип

CVE-2019-3842

больше 6 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
EPSS: Низкий
msrc логотип

CVE-2019-3842

больше 5 лет назад

CVSS3: 7
EPSS: Низкий
debian логотип

CVE-2019-3842

больше 6 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does no ...

CVSS3: 7
EPSS: Низкий
github логотип

GHSA-c23j-qp89-q76c

больше 3 лет назад

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
EPSS: Низкий
fstec логотип

BDU:2019-01945

почти 7 лет назад

Уязвимость модуля pam_systemd демона systemd, связанная с некорректным использованием переменных окружения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемых данных

CVSS3: 7
EPSS: Низкий
rocky логотип

RLSA-2021:1611

больше 4 лет назад

Moderate: systemd security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-1611

больше 4 лет назад

ELSA-2021-1611: systemd security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:1450-1

больше 6 лет назад

Security update for systemd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1265-1

больше 6 лет назад

Security update for systemd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1364-2

больше 6 лет назад

Security update for systemd

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:1364-1

больше 6 лет назад

Security update for systemd

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-3842

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2019-3842

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 4.5
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2019-3842

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
0%
Низкий
больше 6 лет назад
msrc логотип
CVSS3: 7
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-3842

In systemd before v242-rc4, it was discovered that pam_systemd does no ...

CVSS3: 7
0%
Низкий
больше 6 лет назад
github логотип
GHSA-c23j-qp89-q76c

In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".

CVSS3: 7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01945

Уязвимость модуля pam_systemd демона systemd, связанная с некорректным использованием переменных окружения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемых данных

CVSS3: 7
0%
Низкий
почти 7 лет назад
rocky логотип
RLSA-2021:1611

Moderate: systemd security, bug fix, and enhancement update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-1611

ELSA-2021-1611: systemd security, bug fix, and enhancement update (MODERATE)

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2019:1450-1

Security update for systemd

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1265-1

Security update for systemd

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1364-2

Security update for systemd

больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:1364-1

Security update for systemd

больше 6 лет назад

Уязвимостей на страницу