7.2

CVE-2012-3512

Exploit
Munin before 2.0.6 stores plugin state files that run as root in the same group-writable directory as non-root plugins, which allows local users to execute arbitrary code by replacing a state file, as demonstrated using the smart_ plugin.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Munin-monitoringMunin Version <= 2.0.5
Munin-monitoringMunin Version2.0-beta1
Munin-monitoringMunin Version2.0-beta2
Munin-monitoringMunin Version2.0-beta3
Munin-monitoringMunin Version2.0-beta4
Munin-monitoringMunin Version2.0-beta5
Munin-monitoringMunin Version2.0-beta6
Munin-monitoringMunin Version2.0-beta7
Munin-monitoringMunin Version2.0-rc1
Munin-monitoringMunin Version2.0-rc2
Munin-monitoringMunin Version2.0-rc3
Munin-monitoringMunin Version2.0-rc4
Munin-monitoringMunin Version2.0-rc5
Munin-monitoringMunin Version2.0-rc6
Munin-monitoringMunin Version2.0-rc7
Munin-monitoringMunin Version2.0.0
Munin-monitoringMunin Version2.0.1
Munin-monitoringMunin Version2.0.2
Munin-monitoringMunin Version2.0.3
Munin-monitoringMunin Version2.0.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.21
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C
Es wurden noch keine Informationen zu CWE veröffentlicht.