CVE-2019-20373
https://notcve.org/view.php?id=CVE-2019-20373
LTSP LDM through 2.18.06 allows fat-client root access because the LDM_USERNAME variable may have an empty value if the user's shell lacks support for Bourne shell syntax. This is related to a run-x-session script. LTSP LDM versiones hasta 2.18.06, permite el acceso root del fat-client porque la variable LDM_USERNAME puede tener un valor vacío si el shell del usuario carece de compatibilidad para la sintaxis del shell Bourne. Esto está relacionado con un script run-x-session. • https://git.launchpad.net/~ltsp-upstream/ltsp/+git/ldm/commit/?id=c351ac69ef63ed6c84221cef73e409059661b8ba https://lists.debian.org/debian-lts-announce/2020/01/msg00007.html https://www.debian.org/security/2020/dsa-4601 •
CVE-2008-1293
https://notcve.org/view.php?id=CVE-2008-1293
ldm in Linux Terminal Server Project (LTSP) 0.99 and 2 passes the -ac option to the X server on each LTSP client, which allows remote attackers to connect to this server via TCP port 6006 (aka display :6). ldm en Linux Terminal Server Project (LTSP) versiones 0.99 y 2 pasa la opción -ac al servidor X en cada cliente LTSP, lo que permite a los atacantes remotos conectarse a este servidor por medio del puerto TCP 6006 (alias display :6). • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469462 http://secunia.com/advisories/29959 http://secunia.com/advisories/30099 http://www.debian.org/security/2008/dsa-1561 http://www.openwall.com/lists/oss-security/2008/03/11/2 http://www.openwall.com/lists/oss-security/2008/03/12/3 http://www.securityfocus.com/bid/28960 http://www.securitytracker.com/id?1019940 https://exchange.xforce.ibmcloud.com/vulnerabilities/42080 https://usn.ubuntu.com/610-1 • CWE-264: Permissions, Privileges, and Access Controls •