1 results (0.001 seconds)

CVSS: 3.7EPSS: 0%CPEs: 5EXPL: 3

The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option. La función slapper en chkrootkit anterior a 0.50 no cita debidamente las rutas de los ficheros de citas, lo que permite a usuarios locales ejecutar código arbitrario a través de un troyano ejecutable. NOTA: esto solamente es una vulnerabilidad cuando /tmp no está montado con la opción noexec. Chkrootkit before 0.50 will run any executable file named /tmp/update as root, allowing a trivial privsec. • https://www.exploit-db.com/exploits/38775 https://www.exploit-db.com/exploits/33899 http://osvdb.org/show/osvdb/107710 http://packetstormsecurity.com/files/134484/Chkrootkit-Local-Privilege-Escalation.html http://www.chkrootkit.org http://www.debian.org/security/2014/dsa-2945 http://www.openwall.com/lists/oss-security/2014/06/04/9 http://www.ubuntu.com/usn/USN-2230-1 https://security.gentoo.org/glsa/201709-05 https://seclists.org/oss-sec/2014/q2/430 • CWE-20: Improper Input Validation •