3.3

CVE-2024-28085

Exploit
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
KernelUtil-linux Version >= 2.24 < 2.39.4
DebianDebian Linux Version10.0
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 10.18% 0.932
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 3.3 1.8 1.4
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.

http://www.openwall.com/lists/oss-security/2024/03/27/5
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/7
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/8
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/9
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/28/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/28/3
Patch
Third Party Advisory
Mailing List