Summary
Detail | |||
---|---|---|---|
Vendor | Man-Db Project | First view | 2017-09-27 |
Product | Man-Db | Last view | 2023-01-26 |
Version | 2.7.6.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:man-db_project:man-db |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2023-01-26 | CVE-2018-25078 | man-db before 2.8.5 on Gentoo allows local users (with access to the man user account) to gain root privileges because /usr/bin/mandb is executed by root but not owned by root. (Also, the owner can strip the setuid and setgid bits.) |
7.8 | 2017-09-27 | CVE-2015-1336 | The daily mandb cleanup job in Man-db before 2.7.6.1-1 as packaged in Ubuntu and Debian allows local users with access to the man account to gain privileges via vectors involving insecure chown use. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-284 | Access Control (Authorization) Issues |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-07-10 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201707-12.nasl - Type: ACT_GATHER_INFO |