Логотип exploitDog
bind:CVE-2019-16155
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-16155

Количество 3

Количество 3

nvd логотип

CVE-2019-16155

около 6 лет назад

A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user write the system backup file under root privilege through GUI thus can cause root system file overwrite.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-wrhm-j3m8-m326

больше 3 лет назад

A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user write the system backup file under root privilege through GUI thus can cause root system file overwrite.

EPSS: Низкий
fstec логотип

BDU:2022-06504

больше 6 лет назад

Уязвимость реализации сценария для создания резервной копии backupConfig.sh средства защиты Fortinet FortiClient для Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-16155

A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user write the system backup file under root privilege through GUI thus can cause root system file overwrite.

CVSS3: 7.1
0%
Низкий
около 6 лет назад
github логотип
GHSA-wrhm-j3m8-m326

A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow a user with low privilege to overwrite system files as root with arbitrary content through system backup file via specially crafted "BackupConfig" type IPC client requests to the fctsched process. Further more, FortiClient for Linux 6.2.2 and below allow low privilege user write the system backup file under root privilege through GUI thus can cause root system file overwrite.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06504

Уязвимость реализации сценария для создания резервной копии backupConfig.sh средства защиты Fortinet FortiClient для Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.1
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу