Логотип exploitDog
bind:CVE-2019-11481
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-11481

Количество 4

Количество 4

ubuntu логотип

CVE-2019-11481

около 6 лет назад

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 3.8
EPSS: Низкий
nvd логотип

CVE-2019-11481

около 6 лет назад

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 3.8
EPSS: Низкий
github логотип

GHSA-7hrm-rprg-v656

больше 3 лет назад

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2020-01333

около 6 лет назад

Уязвимость службы регистрации ошибок apport операционной системы Ubuntu, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-11481

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 3.8
0%
Низкий
около 6 лет назад
nvd логотип
CVE-2019-11481

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 3.8
0%
Низкий
около 6 лет назад
github логотип
GHSA-7hrm-rprg-v656

Kevin Backhouse discovered that apport would read a user-supplied configuration file with elevated privileges. By replacing the file with a symbolic link, a user could get apport to read any file on the system as root, with unknown consequences.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2020-01333

Уязвимость службы регистрации ошибок apport операционной системы Ubuntu, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
0%
Низкий
около 6 лет назад

Уязвимостей на страницу