eSeSIX Thintune thin clients running firmware 2.4.38 and earlier allow local users to gain privileges by pressing CTRL-SHIFT-ALT-DEL and entering the "maertsJ" password, which is hard-coded into lshell.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=109068491801021&w=2 - | |
References | () http://secunia.com/advisories/12154 - Exploit | |
References | () http://securitytracker.com/id?1010770 - | |
References | () http://www.osvdb.org/8248 - | |
References | () http://www.securityfocus.com/bid/10794 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16808 - |
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-2050
Mitre link : CVE-2004-2050
CVE.ORG link : CVE-2004-2050
JSON object : View
Products Affected
esesix
- thintune_xs
- thintune_mobile
- thintune_l
- thintune_extreme
- thintune_m
- thintune_xm
- thintune_s
CWE