Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
2 vulnerabilities by ktsuss
CVE-2011-2922 (GCVE-0-2011-2922)
Vulnerability from cvelistv5 – Published: 2019-11-19 18:08 – Updated: 2024-08-06 23:15
VLAI?
Summary
ktsuss versions 1.4 and prior spawns the GTK interface to run as root. This can allow a local attacker to escalate privileges to root and use the "GTK_MODULES" environment variable to possibly execute arbitrary code.
Severity ?
No CVSS data available.
CWE
- UNKNOWN_TYPE
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:32.119Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2011-2922"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2011-2922"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://packetstormsecurity.com/files/cve/CVE-2011-2922"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.securityfocus.com/bid/49151"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lwn.net/Articles/477678/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ktsuss",
"vendor": "ktsuss",
"versions": [
{
"status": "affected",
"version": "1.4 and prior"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ktsuss versions 1.4 and prior spawns the GTK interface to run as root. This can allow a local attacker to escalate privileges to root and use the \"GTK_MODULES\" environment variable to possibly execute arbitrary code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "UNKNOWN_TYPE",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-19T18:08:30.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2011-2922"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://access.redhat.com/security/cve/cve-2011-2922"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://packetstormsecurity.com/files/cve/CVE-2011-2922"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.securityfocus.com/bid/49151"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lwn.net/Articles/477678/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2922",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ktsuss",
"version": {
"version_data": [
{
"version_value": "1.4 and prior"
}
]
}
}
]
},
"vendor_name": "ktsuss"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ktsuss versions 1.4 and prior spawns the GTK interface to run as root. This can allow a local attacker to escalate privileges to root and use the \"GTK_MODULES\" environment variable to possibly execute arbitrary code."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "UNKNOWN_TYPE"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security-tracker.debian.org/tracker/CVE-2011-2922",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2011-2922"
},
{
"name": "https://access.redhat.com/security/cve/cve-2011-2922",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/cve-2011-2922"
},
{
"name": "https://packetstormsecurity.com/files/cve/CVE-2011-2922",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/cve/CVE-2011-2922"
},
{
"name": "https://www.securityfocus.com/bid/49151",
"refsource": "MISC",
"url": "https://www.securityfocus.com/bid/49151"
},
{
"name": "https://lwn.net/Articles/477678/",
"refsource": "MISC",
"url": "https://lwn.net/Articles/477678/"
},
{
"name": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466",
"refsource": "MISC",
"url": "https://snyk.io/vuln/SNYK-LINUX-KTSUSS-174466"
},
{
"name": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/109154/Gentoo-Linux-Security-Advisory-201201-15.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2922",
"datePublished": "2019-11-19T18:08:30.000Z",
"dateReserved": "2011-07-27T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:15:32.119Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-2921 (GCVE-0-2011-2921)
Vulnerability from cvelistv5 – Published: 2019-11-19 16:57 – Updated: 2024-08-06 23:15
VLAI?
Summary
ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges.
Severity ?
No CVSS data available.
CWE
- Other
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:15:31.972Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2011-2921"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/cve-2011-2921"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "ktsuss",
"vendor": "ktsuss",
"versions": [
{
"status": "affected",
"version": "1.4 and prior"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Other",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-19T16:57:33.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security-tracker.debian.org/tracker/CVE-2011-2921"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://access.redhat.com/security/cve/cve-2011-2921"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-2921",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "ktsuss",
"version": {
"version_data": [
{
"version_value": "1.4 and prior"
}
]
}
}
]
},
"vendor_name": "ktsuss"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html"
},
{
"name": "https://security-tracker.debian.org/tracker/CVE-2011-2921",
"refsource": "MISC",
"url": "https://security-tracker.debian.org/tracker/CVE-2011-2921"
},
{
"name": "https://access.redhat.com/security/cve/cve-2011-2921",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/cve-2011-2921"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-2921",
"datePublished": "2019-11-19T16:57:33.000Z",
"dateReserved": "2011-07-27T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:15:31.972Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}