Vulnerabilites related to ktsuss - ktsuss
CVE-2011-2921 (GCVE-0-2011-2921)
Vulnerability from cvelistv5
Published
2019-11-19 16:57
Modified
2024-08-06 23:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other
Summary
ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.
References
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html | x_refsource_MISC | |
https://security-tracker.debian.org/tracker/CVE-2011-2921 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2011-2921 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-2921" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-2921" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ktsuss", "vendor": "ktsuss", "versions": [ { "status": "affected", "version": "1.4 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-19T16:57:33", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-2921" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-2921" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2921", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ktsuss", "version": { "version_data": [ { "version_value": "1.4 and prior" } ] } } ] }, "vendor_name": "ktsuss" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2011-2921", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2011-2921" }, { "name": "https://access.redhat.com/security/cve/cve-2011-2921", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2011-2921" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2921", "datePublished": "2019-11-19T16:57:33", "dateReserved": "2011-07-27T00:00:00", "dateUpdated": "2024-08-06T23:15:31.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2922 (GCVE-0-2011-2922)
Vulnerability from cvelistv5
Published
2019-11-19 18:08
Modified
2024-08-06 23:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- UNKNOWN_TYPE
Summary
ktsuss versions 1.4 and prior spawns the GTK interface to run as root. This can allow a local attacker to escalate privileges to root and use the "GTK_MODULES" environment variable to possibly execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2011-2922 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2011-2922 | x_refsource_MISC | |
https://packetstormsecurity.com/files/cve/CVE-2011-2922 | x_refsource_MISC | |
https://www.securityfocus.com/bid/49151 | x_refsource_MISC | |
https://lwn.net/Articles/477678/ | x_refsource_MISC | |
https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466 | x_refsource_MISC | |
https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:32.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-2922" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-2922" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/cve/CVE-2011-2922" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityfocus.com/bid/49151" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://lwn.net/Articles/477678/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ktsuss", "vendor": "ktsuss", "versions": [ { "status": "affected", "version": "1.4 and prior" } ] } ], "descriptions": [ { "lang": "en", "value": "ktsuss versions 1.4 and prior spawns the GTK interface to run as root. This can allow a local attacker to escalate privileges to root and use the \"GTK_MODULES\" environment variable to possibly execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "UNKNOWN_TYPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-19T18:08:30", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-2922" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-2922" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/cve/CVE-2011-2922" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityfocus.com/bid/49151" }, { "tags": [ "x_refsource_MISC" ], "url": "https://lwn.net/Articles/477678/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466" }, { "tags": [ "x_refsource_MISC" ], "url": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2922", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "ktsuss", "version": { "version_data": [ { "version_value": "1.4 and prior" } ] } } ] }, "vendor_name": "ktsuss" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ktsuss versions 1.4 and prior spawns the GTK interface to run as root. This can allow a local attacker to escalate privileges to root and use the \"GTK_MODULES\" environment variable to possibly execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNKNOWN_TYPE" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2011-2922", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2011-2922" }, { "name": "https://access.redhat.com/security/cve/cve-2011-2922", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2011-2922" }, { "name": "https://packetstormsecurity.com/files/cve/CVE-2011-2922", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/cve/CVE-2011-2922" }, { "name": "https://www.securityfocus.com/bid/49151", "refsource": "MISC", "url": "https://www.securityfocus.com/bid/49151" }, { "name": "https://lwn.net/Articles/477678/", "refsource": "MISC", "url": "https://lwn.net/Articles/477678/" }, { "name": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466", "refsource": "MISC", "url": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466" }, { "name": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html", "refsource": "MISC", "url": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2922", "datePublished": "2019-11-19T18:08:30", "dateReserved": "2011-07-27T00:00:00", "dateUpdated": "2024-08-06T23:15:32.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }