Vulnerability CVE-2017-5899


Published: 2017-03-27

Description:
Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
S-nail < 14.8.16 Local Privilege Escalation
Bcoles
30.07.2019

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
S-nail project -> S-nail 

 References:
http://www.openwall.com/lists/oss-security/2017/01/27/7
http://www.openwall.com/lists/oss-security/2017/02/07/4
http://www.securityfocus.com/bid/96138
https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html

Copyright 2024, cxsecurity.com

 

Back to Top