Vulnerability Description
A privilege escalation to root exists in Eternal Terminal prior to version 6.2.0. This is due to the combination of a race condition, buffer overflow, and logic bug all in PipeSocketHandler::listen().
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eternal Terminal Project | Eternal Terminal | < 6.2.0 |
Related Weaknesses (CWE)
References
- https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac848PatchThird Party Advisory
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxgExploitThird Party Advisory
- https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac848PatchThird Party Advisory
- https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxgExploitThird Party Advisory
FAQ
What is CVE-2022-24949?
CVE-2022-24949 is a vulnerability with a CVSS score of 7.5 (HIGH). A privilege escalation to root exists in Eternal Terminal prior to version 6.2.0. This is due to the combination of a race condition, buffer overflow, and logic bug all in PipeSocketHandler::listen().
How severe is CVE-2022-24949?
CVE-2022-24949 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24949?
Check the references section above for vendor advisories and patch information. Affected products include: Eternal Terminal Project Eternal Terminal.