Логотип exploitDog
bind:CVE-2016-9638
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-9638

Количество 2

Количество 2

nvd логотип

CVE-2016-9638

около 9 лет назад

In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-g265-mq7h-8cq4

больше 3 лет назад

In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-9638

In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.

CVSS3: 7.8
0%
Низкий
около 9 лет назад
github логотип
GHSA-g265-mq7h-8cq4

In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу