CVE-2017-5899

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.
Configurations

Configuration 1 (hide)

cpe:2.3:a:s-nail_project:s-nail:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:49

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html', 'name': '[s-nail-users] 20170127 [ANN]ounce of S-nail v14.8.16 ("Copris lunaris")', 'tags': ['Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://www.mail-archive.com/s-nail-users%40lists.sourceforge.net/msg00551.html -

Information

Published : 2017-03-27 15:59

Updated : 2024-02-28 15:44


NVD link : CVE-2017-5899

Mitre link : CVE-2017-5899

CVE.ORG link : CVE-2017-5899


JSON object : View

Products Affected

s-nail_project

  • s-nail
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')