CVE-2021-26936

The replay-sorcery program in ReplaySorcery 0.4.0 through 0.5.0, when using the default setuid-root configuration, allows a local attacker to escalate privileges to root by specifying video output paths in privileged locations.
References
Link Resource
http://www.openwall.com/lists/oss-security/2021/02/10/1 Exploit Mailing List Patch Third Party Advisory
https://github.com/matanui159/ReplaySorcery/releases Release Notes Third Party Advisory
http://www.openwall.com/lists/oss-security/2021/02/10/1 Exploit Mailing List Patch Third Party Advisory
https://github.com/matanui159/ReplaySorcery/releases Release Notes Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:replaysorcery_project:replaysorcery:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:57

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/02/10/1 - Exploit, Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/02/10/1 - Exploit, Mailing List, Patch, Third Party Advisory
References () https://github.com/matanui159/ReplaySorcery/releases - Release Notes, Third Party Advisory () https://github.com/matanui159/ReplaySorcery/releases - Release Notes, Third Party Advisory

Information

Published : 2021-02-10 18:15

Updated : 2024-11-21 05:57


NVD link : CVE-2021-26936

Mitre link : CVE-2021-26936

CVE.ORG link : CVE-2021-26936


JSON object : View

Products Affected

replaysorcery_project

  • replaysorcery
CWE
CWE-269

Improper Privilege Management