Publication date: | 02/25/2022 |
Total views: | 21489 |
Danger: |
Medium |
Fix available: | Yes |
Number of vulnerabilities: | one |
CVSSv3.1 rating: | 8.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C] |
CVE ID: | CVE-2022-25643 |
Operating vector: | Remote |
Impact: | System compromise |
CWE ID: | No data |
Exploit presence: | No data |
Vulnerable products: | seated |
Vulnerable versions: | seated versions 0.6.3, 0.6.2, 0.6.1, 0.6.0, 0.5.0, 0.4.0, 0.3.0, 0.2.0, 0.1.0 |
Description: |
Privilege escalation in Seatd |
Manufacturer URL: | https://github.com/kennylevinsen |
Solution: | Install the patch from the manufacturer’s website. |
Links: | https://github.com/kennylevinsen/seatd/tags https://lists.sr.ht/~kennylevinsen/seatd-announce/%3CETEO7R.QG8B1KGD531R1%40kl.wtf%3E https://github.com/kennylevinsen/seatd/compare/0.6.3…0.6.4 |
Source: securitylab.ru