CVE-2011-1946
Published Jul 7, 2011
Last updated 7 years ago
Overview
- Description
- gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hongli_lai:libgnomesu:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32364E8A-2810-492A-9008-6EEA80D02ED9" } ], "operator": "OR" } ] } ]