Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-3864

EPSS 0.57% · P69
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-3864

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 访问控制错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于当某些 SUID 二进制文件执行其后代时,在处理可转储标志设置的方式中发现了一个缺陷。先决条件是 SUID 二进制文件,它将实际 UID 设置为有效 UID,将实际 GID 设置为等于有效 GID。然后,子体的可转储值将设置为 1。因此,如果后代进程崩溃,并且core_pattern设置为相对值,则其核心转储将存储在具有 uid:gid 权限的当前目录中。具有符合条件的根
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-kernel Not Known -

II. Public POCs for CVE-2021-3864

#POC DescriptionSource LinkShenlong Link
1Test for cve-2021-3864https://github.com/walac/cve-2021-3864POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-3864

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-08-26 · 53 CVEs total

CVE-2021-4216Artifex Software MuPDF 数字错误漏洞
CVE-2022-36548Edoc-doctor-appointment-system 跨站脚本漏洞
CVE-2022-36547Edoc-doctor-appointment-system 跨站脚本漏洞
CVE-2022-36542Edoc-doctor-appointment-system 安全漏洞
CVE-2022-36545Edoc-doctor-appointment-system SQL注入漏洞
CVE-2022-36544Edoc-doctor-appointment-system SQL注入漏洞
CVE-2022-36543Edoc-doctor-appointment-system SQL注入漏洞
CVE-2022-36546Edoc-doctor-appointment-system 跨站请求伪造漏洞
CVE-2022-0084Red Hat Data Grid 安全漏洞
CVE-2022-25625Broadcom Symantec Privileged Access Management 安全漏洞
CVE-2022-0168Linux kernel 代码问题漏洞
CVE-2021-3414Red Hat Satellite 安全漏洞
CVE-2021-3632Red Hat Single Sign-On 授权问题漏洞
CVE-2021-3585openstack-tripleo-heat-templates 安全漏洞
CVE-2021-3563Red Hat OpenStack Platform 安全漏洞
CVE-2021-3754Red Hat Keycloak 安全漏洞
CVE-2021-3735QEMU 安全漏洞
CVE-2021-3703Red Hat OpenShift 安全漏洞
CVE-2021-3688Red Hat JBoss Core Services 信息泄露漏洞
CVE-2021-3669Linux kernel资源管理错误漏洞

Showing top 20 of 53 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-3864

No comments yet


Leave a comment