mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
72 lines
2.3 KiB
JSON
72 lines
2.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secalert@redhat.com",
|
|
"ID": "CVE-2011-2921",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "ktsuss",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "ktsuss",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "1.4 and prior"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "ktsuss versions 1.4 and prior has the uid set to root and does not drop privileges prior to executing user specified commands, which can result in command execution with root privileges."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Other"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html",
|
|
"url": "http://packetstormsecurity.com/files/154307/ktsuss-Suid-Privilege-Escalation.html"
|
|
},
|
|
{
|
|
"url": "https://security-tracker.debian.org/tracker/CVE-2011-2921",
|
|
"refsource": "MISC",
|
|
"name": "https://security-tracker.debian.org/tracker/CVE-2011-2921"
|
|
},
|
|
{
|
|
"url": "https://access.redhat.com/security/cve/cve-2011-2921",
|
|
"refsource": "MISC",
|
|
"name": "https://access.redhat.com/security/cve/cve-2011-2921"
|
|
}
|
|
]
|
|
}
|
|
} |