Логотип exploitDog
bind:CVE-2019-19522
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19522

Количество 2

Количество 2

nvd логотип

CVE-2019-19522

около 6 лет назад

OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-w448-mv88-mx78

больше 3 лет назад

OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-19522

OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.

CVSS3: 7.8
0%
Низкий
около 6 лет назад
github логотип
GHSA-w448-mv88-mx78

OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.

CVSS3: 7.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу