arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082553.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082565.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082569.html - | |
References | () http://www.debian.org/security/2012/dsa-2481 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:113 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/24/12 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/24/13 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/24/14 - | |
References | () http://www.openwall.com/lists/oss-security/2012/05/25/5 - | |
References | () https://security.gentoo.org/glsa/201607-16 - |
Information
Published : 2012-07-12 20:55
Updated : 2025-04-11 00:51
NVD link : CVE-2012-2653
Mitre link : CVE-2012-2653
CVE.ORG link : CVE-2012-2653
JSON object : View
Products Affected
lawrence_berkeley_national_laboratory
- arpwatch
CWE