3.3

CVE-2024-28085

Exploit

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Data is provided by the National Vulnerability Database (NVD)
KernelUtil-linux Version >= 2.24 < 2.39.4
DebianDebian Linux Version10.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 10.51% 0.93
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
134c704f-9b21-4f2e-91b3-4a467353bcc0 3.3 1.8 1.4
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.

http://www.openwall.com/lists/oss-security/2024/03/27/5
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/7
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/8
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/9
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/28/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/28/3
Patch
Third Party Advisory
Mailing List