Vulnerabilities > CVE-2019-18862 - Unspecified vulnerability in GNU Mailutils 0.5/0.6
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Exploit-Db
id | EDB-ID:47703 |
last seen | 2019-11-21 |
modified | 2019-11-21 |
published | 2019-11-21 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/47703 |
title | GNU Mailutils 3.7 - Privilege Escalation |
Packetstorm
data source | https://packetstormsecurity.com/files/download/155425/gnumailutils37-escalate.txt |
id | PACKETSTORM:155425 |
last seen | 2019-11-21 |
published | 2019-11-21 |
reporter | Mike Gualtieri |
source | https://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html |
title | GNU Mailutils 3.7 Privilege Escalation |
References
- http://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html
- http://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html
- https://git.savannah.gnu.org/cgit/mailutils.git/tree/NEWS
- https://git.savannah.gnu.org/cgit/mailutils.git/tree/NEWS
- https://security.gentoo.org/glsa/202006-12
- https://security.gentoo.org/glsa/202006-12