Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2004-0233

6 documents6 sources
Severity
2.1LOW
EPSS
0.2%
top 56.22%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 18
Latest updateApr 29

Description

Utempter allows device names that contain .. (dot dot) directory traversal sequences, which allows local users to overwrite arbitrary files via a symlink attack on device names in combination with an application that trusts the utmp or wtmp files.

CVSS vector

AV:L/AC:L/C:N/I:P/A:NExploitability: 3.9 | Impact: 2.9

Affected Packages3 packages

NVDutempter/utempter0.5.2, 0.5.3+1
NVDsgi/propack2.4, 3.0+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-67cc-jx4w-3hpw: Utempter allows device names that contain2022-04-29
CVEList
CVE-2004-0233: Utempter allows device names that contain2004-05-05

💥Exploits & PoCs

1
Exploit-DB
UTempter 0.5.x - Multiple Local Vulnerabilities2004-04-19

📋Vendor Advisories

1
Red Hat
security flaw2004-04-03

💬Community

1
Bugzilla
CVE-2004-0233 security flaw2018-08-16