3.3

CVE-2024-28085

Exploit

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
KernelUtil-linux Version >= 2.24 < 2.39.4
DebianDebian Linux Version10.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 10.51% 0.93
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
134c704f-9b21-4f2e-91b3-4a467353bcc0 3.3 1.8 1.4
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.

http://www.openwall.com/lists/oss-security/2024/03/27/5
Third Party Advisory
Exploit
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/7
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/8
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/27/9
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/28/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2024/03/28/3
Patch
Third Party Advisory
Mailing List