Vulnerability Description
Plash permits sandboxed processes to open /dev/tty, which allows local users to escape sandbox restrictions and execute arbitrary commands by sending characters to a shell process on the same termimal via the TIOCSTI ioctl.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Plesh | Plesh | All versions |
References
- http://lists.gnu.org/archive/html/plash/2007-03/msg00000.html
- http://plash.beasts.org/wiki/PlashIssues/TtyVulnerabilityPatchVendor Advisory
- http://secunia.com/advisories/24498
- http://www.osvdb.org/32598PatchVendor Advisory
- http://www.securityfocus.com/bid/22892
- http://www.vupen.com/english/advisories/2007/0909
- http://lists.gnu.org/archive/html/plash/2007-03/msg00000.html
- http://plash.beasts.org/wiki/PlashIssues/TtyVulnerabilityPatchVendor Advisory
- http://secunia.com/advisories/24498
- http://www.osvdb.org/32598PatchVendor Advisory
- http://www.securityfocus.com/bid/22892
- http://www.vupen.com/english/advisories/2007/0909
FAQ
What is CVE-2007-1400?
CVE-2007-1400 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Plash permits sandboxed processes to open /dev/tty, which allows local users to escape sandbox restrictions and execute arbitrary commands by sending characters to a shell process on the same termimal...
How severe is CVE-2007-1400?
CVE-2007-1400 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-1400?
Check the references section above for vendor advisories and patch information. Affected products include: Plesh Plesh.