CVE-2007-1400

Plash permits sandboxed processes to open /dev/tty, which allows local users to escape sandbox restrictions and execute arbitrary commands by sending characters to a shell process on the same termimal via the TIOCSTI ioctl.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plesh:plesh:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:28

Type Values Removed Values Added
References () http://lists.gnu.org/archive/html/plash/2007-03/msg00000.html - () http://lists.gnu.org/archive/html/plash/2007-03/msg00000.html -
References () http://plash.beasts.org/wiki/PlashIssues/TtyVulnerability - Patch, Vendor Advisory () http://plash.beasts.org/wiki/PlashIssues/TtyVulnerability - Patch, Vendor Advisory
References () http://secunia.com/advisories/24498 - () http://secunia.com/advisories/24498 -
References () http://www.osvdb.org/32598 - Patch, Vendor Advisory () http://www.osvdb.org/32598 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/22892 - () http://www.securityfocus.com/bid/22892 -
References () http://www.vupen.com/english/advisories/2007/0909 - () http://www.vupen.com/english/advisories/2007/0909 -

Information

Published : 2007-03-10 22:19

Updated : 2024-11-21 00:28


NVD link : CVE-2007-1400

Mitre link : CVE-2007-1400

CVE.ORG link : CVE-2007-1400


JSON object : View

Products Affected

plesh

  • plesh