wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
References
Configurations
History
20 Mar 2025, 17:58
Type | Values Removed | Values Added |
---|---|---|
First Time |
Kernel
Kernel util-linux Debian debian Linux Debian |
|
CPE | cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
|
References | () http://www.openwall.com/lists/oss-security/2024/03/27/5 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/6 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/7 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/8 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/9 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/1 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/3 - Mailing List, Patch, Third Party Advisory | |
References | () https://github.com/skyler-ferrante/CVE-2024-28085 - Exploit, Third Party Advisory | |
References | () https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq - Broken Link | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html - Mailing List, Third Party Advisory | |
References | () https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/ - Product | |
References | () https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt - Exploit, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240531-0003/ - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2024/03/27/5 - Mailing List, Third Party Advisory |
21 Nov 2024, 09:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/03/27/5 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/6 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/7 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/8 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/9 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/1 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/2 - | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/3 - | |
References | () https://github.com/skyler-ferrante/CVE-2024-28085 - | |
References | () https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq - | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html - | |
References | () https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/ - | |
References | () https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt - | |
References | () https://security.netapp.com/advisory/ntap-20240531-0003/ - | |
References | () https://www.openwall.com/lists/oss-security/2024/03/27/5 - |
26 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-150 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.3 |
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Apr 2024, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
27 Mar 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-27 19:15
Updated : 2025-03-20 17:58
NVD link : CVE-2024-28085
Mitre link : CVE-2024-28085
CVE.ORG link : CVE-2024-28085
JSON object : View
Products Affected
kernel
- util-linux
debian
- debian_linux
CWE
CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences