CVE-2017-5899

Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.
Configurations

Configuration 1 (hide)

cpe:2.3:a:s-nail_project:s-nail:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:28

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2017/01/27/7 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/01/27/7 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/02/07/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/02/07/4 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/96138 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96138 - Third Party Advisory, VDB Entry
References () https://www.mail-archive.com/s-nail-users%40lists.sourceforge.net/msg00551.html - () https://www.mail-archive.com/s-nail-users%40lists.sourceforge.net/msg00551.html -

07 Nov 2023, 02:49

Type Values Removed Values Added
References
  • {'url': 'https://www.mail-archive.com/s-nail-users@lists.sourceforge.net/msg00551.html', 'name': '[s-nail-users] 20170127 [ANN]ounce of S-nail v14.8.16 ("Copris lunaris")', 'tags': ['Third Party Advisory'], 'refsource': 'MLIST'}
  • () https://www.mail-archive.com/s-nail-users%40lists.sourceforge.net/msg00551.html -

Information

Published : 2017-03-27 15:59

Updated : 2024-11-21 03:28


NVD link : CVE-2017-5899

Mitre link : CVE-2017-5899

CVE.ORG link : CVE-2017-5899


JSON object : View

Products Affected

s-nail_project

  • s-nail
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')