Vulnerability Name: | CCN-15789 | ||||||
Published: | 2004-03-27 | ||||||
Updated: | 2004-03-27 | ||||||
Summary: | Systrace could allow a local attacker to bypass a Systrace policy, caused by insufficient checking during tracing of a process with ptrace. | ||||||
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Sat Mar 27 2004 - 15:01:03 CST systrace silently patches full local bypass vulnerability on Linux Source: CCN Type: BugTraq Mailing List, Mon Mar 29 2004 - 14:10:29 CST Re: systrace silently patches full local bypass vulnerability on Linux Source: CCN Type: Systrace Web page Systrace - Interactive Policy Generation for System Calls Source: CCN Type: BID-9998 Systrace Local Policy Bypass Vulnerability Source: XF Type: UNKNOWN systrace-policy-bypass(15789) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |