2024-05-25 21:48:12 +02:00
### [CVE-2024-28085](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085)



### Description
wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
### POC
#### Reference
2024-06-22 09:37:59 +00:00
- http://www.openwall.com/lists/oss-security/2024/03/27/5
2024-05-25 21:48:12 +02:00
- https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
- https://www.openwall.com/lists/oss-security/2024/03/27/5
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/Aires-Observer/study_trivy
2024-05-25 21:48:12 +02:00
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/kherrick/lobsters
2025-09-29 16:08:36 +00:00
- https://github.com/myh0301/KNOWHOW
- https://github.com/ndouglas-cloudsmith/exploit-check
2024-05-25 21:48:12 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/oditynet/sleepall
2024-05-25 21:48:12 +02:00
- https://github.com/skyler-ferrante/CVE-2024-28085
2024-06-07 04:52:01 +00:00
- https://github.com/testing-felickz/docker-scout-demo
2024-05-25 21:48:12 +02:00