Page 3 of 12 results (0.004 seconds)

CVSS: 7.0EPSS: 0%CPEs: 4EXPL: 1

syscheck/seechanges.c in OSSEC 2.7 through 2.8.1 on NIX systems allows local users to execute arbitrary code as root. syscheck/seechanges.c en OSSEC 2.7 hasta la versión 2.8.1 en sistemas NIX permite que los usuarios locales ejecuten código arbitrario como root. OSSEC versions 2.7 through 2.8.1 suffer from a local root escalation vulnerability. • https://www.exploit-db.com/exploits/37265 http://packetstormsecurity.com/files/132281/OSSEC-2.8.1-Local-Root-Escalation.html http://www.openwall.com/lists/oss-security/2015/06/11/1 http://www.securityfocus.com/bid/75148 https://github.com/ossec/ossec-hids/releases/tag/2.8.2 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable filenames without verifying ownership, which allows local users to modify access restrictions in hosts.deny and gain root privileges by creating the temporary files before automatic IP blocking is performed. host-deny.sh en OSSEC anterior a 2.8.1 escribe a ficheros temporales con nombres de ficheros previsibles sin verificar su dueño, lo que permite a usuarios locales modificar las restricciones de acceso en hosts.deny y ganar privilegios de root mediante la creación de los ficheros temporales antes de que se realice el bloqueo IP automático. OSSEC version 2.8 suffers from a privilege escalation vulnerability via insecure temporary file creation. • https://www.exploit-db.com/exploits/35234 https://github.com/mbadanoiu/CVE-2014-5284 http://packetstormsecurity.com/files/129111/OSSEC-2.8-Privilege-Escalation.html http://www.exploit-db.com/exploits/35234 https://github.com/ossec/ossec-hids/releases/tag/2.8.1 • CWE-264: Permissions, Privileges, and Access Controls •