- Description
- x11.c in xonix 1.4 and earlier uses the current working directory to find and execute the rmail program, which allows local users to execute arbitrary code by modifying the path to point to a malicious rmail program.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xonix:xonix:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B70B149F-9519-46D6-BC4F-5C2316A2D6B8",
"versionEndIncluding": "1.4"
}
],
"operator": "OR"
}
]
}
]