Plash permits sandboxed processes to open /dev/tty, which allows local users to escape sandbox restrictions and execute arbitrary commands by sending characters to a shell process on the same termimal via the TIOCSTI ioctl.
References
Configurations
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.gnu.org/archive/html/plash/2007-03/msg00000.html - | |
References | () http://plash.beasts.org/wiki/PlashIssues/TtyVulnerability - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/24498 - | |
References | () http://www.osvdb.org/32598 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/22892 - | |
References | () http://www.vupen.com/english/advisories/2007/0909 - |
Information
Published : 2007-03-10 22:19
Updated : 2024-11-21 00:28
NVD link : CVE-2007-1400
Mitre link : CVE-2007-1400
CVE.ORG link : CVE-2007-1400
JSON object : View
Products Affected
plesh
- plesh
CWE