Executive Summary

Name CVE-2007-1400 First vendor Publication 2007-03-10
Vendor Cve Last vendor Modification 2011-03-08

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 6.9 Attack Range Local
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Plash permits sandboxed processes to open /dev/tty, which allows local users to escape sandbox restrictions and execute arbitrary commands by sending characters to a shell process on the same termimal via the TIOCSTI ioctl.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1400

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
32598 Plash TTY ioctl() Character Injection

It is possible for a sandboxed process to put characters into the input stream of the terminal using the TIOCSTI ioctl() on the tty's file descriptor. This data may be interpreted by a shell running on the terminal, allowing the sandboxed process to run code with the full authority of the user.

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/22892
CONFIRM http://plash.beasts.org/wiki/PlashIssues/TtyVulnerability
MLIST http://lists.gnu.org/archive/html/plash/2007-03/msg00000.html
OSVDB http://www.osvdb.org/32598
SECUNIA http://secunia.com/advisories/24498
VUPEN http://www.vupen.com/english/advisories/2007/0909

Alert History

If you want to see full details history, please login or register.
Date Informations
2020-05-23 00:19:25
  • Multiple Updates
2016-06-28 16:16:52
  • Multiple Updates
2016-04-26 15:51:38
  • Multiple Updates
2013-05-11 10:20:28
  • Multiple Updates