CVE-2016-2781
https://notcve.org/view.php?id=CVE-2016-2781
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer. chroot en GNU coreutils, cuando se usa con --userspec, permite a usuarios locales escapar a la sesión principal a través de una llamada ioctl TIOCSTI manipulada, que empuja caracteres al búfer de entrada del terminal. • http://www.openwall.com/lists/oss-security/2016/02/28/2 http://www.openwall.com/lists/oss-security/2016/02/28/3 https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E • CWE-20: Improper Input Validation •
CVE-2014-9471
https://notcve.org/view.php?id=CVE-2014-9471
The parse_datetime function in GNU coreutils allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted date string, as demonstrated by the "--date=TZ="123"345" @1" string to the touch or date command. La función parse_datetime en GNU coreutils permite a atacantes remotos causar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de una cadena de datos manipulada, tal y como fue demostrado por la cadena '--date=TZ='123'345' @1' en el comando touch o date. • http://advisories.mageia.org/MGASA-2015-0029.html http://debbugs.gnu.org/cgi/bugreport.cgi?bug=16872 http://secunia.com/advisories/62226 http://ubuntu.com/usn/usn-2473-1 http://www.mandriva.com/security/advisories?name=MDVSA-2015:179 http://www.openwall.com/lists/oss-security/2014/11/25/1 http://www.openwall.com/lists/oss-security/2014/11/25/4 http://www.openwall.com/lists/oss-security/2015/01/03/11 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=7661 •
CVE-2009-4135
https://notcve.org/view.php?id=CVE-2009-4135
The distcheck rule in dist-check.mk in GNU coreutils 5.2.1 through 8.1 allows local users to gain privileges via a symlink attack on a file in a directory tree under /tmp. La regla distcheck en dist-check.mk en GNU coreutils desde v5.2.1 hasta v8.1 permite a usuarios locales ganar privilegios a través de un ataque de enlace simbólico en un fichero que este en la carpeta /tmp. • http://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=ae034822c535fa5 http://marc.info/?l=oss-security&m=126030454503441&w=2 http://secunia.com/advisories/37645 http://secunia.com/advisories/37860 http://secunia.com/advisories/62226 http://www.mail-archive.com/bug-coreutils%40gnu.org/msg18779.html http://www.mail-archive.com/bug-coreutils%40gnu.org/msg18787.html http://www.openwall.com/lists/oss-security/2009/12/08/4 http://www.osvdb.org/60853 http://www.sec • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2008-1946 – /etc/pam.d/su is wrong in RHEL-4.6
https://notcve.org/view.php?id=CVE-2008-1946
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module. La configuración por defecto de "su" en /etc/pam.d/su en GNU Coreutils 5.2.1, permite a usuarios locales elevar sus privilegios de una cuenta (1) bloqueada o (2) caducada introduciendo el nombre de usuario en la línea de comandos. Relacionado con un uso indebido del módulo pam_succeed_if.so. • http://rhn.redhat.com/errata/RHSA-2008-0780.html http://secunia.com/advisories/31225 http://securitytracker.com/id?1020552 http://www.securityfocus.com/bid/30363 https://exchange.xforce.ibmcloud.com/vulnerabilities/43993 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10029 https://access.redhat.com/security/cve/CVE-2008-1946 https://bugzilla.redhat.com/show_bug.cgi?id=446488 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-1039
https://notcve.org/view.php?id=CVE-2005-1039
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files. • http://www.securityfocus.com/bid/13053 •