Filtered by vendor Eternal Terminal Project
Subscriptions
Filtered by product Eternal Terminal
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-48258 | 1 Eternal Terminal Project | 1 Eternal Terminal | 2024-05-02 | 5.3 Medium |
In Eternal Terminal 6.2.1, etserver and etclient have world-readable logfiles. | ||||
CVE-2022-48257 | 1 Eternal Terminal Project | 1 Eternal Terminal | 2024-05-02 | 5.3 Medium |
In Eternal Terminal 6.2.1, etserver and etclient have predictable logfile names in /tmp. | ||||
CVE-2022-24949 | 1 Eternal Terminal Project | 1 Eternal Terminal | 2023-11-07 | 7.5 High |
A privilege escalation to root exists in Eternal Terminal prior to version 6.2.0. This is due to the combination of a race condition, buffer overflow, and logic bug all in PipeSocketHandler::listen(). | ||||
CVE-2023-23558 | 1 Eternal Terminal Project | 1 Eternal Terminal | 2023-02-27 | 6.3 Medium |
In Eternal Terminal 6.2.1, TelemetryService uses fixed paths in /tmp. For example, a local attacker can create /tmp/.sentry-native-etserver with mode 0777 before the etserver process is started. The attacker can choose to read sensitive information from that file, or modify the information in that file. | ||||
CVE-2022-24952 | 1 Eternal Terminal Project | 1 Eternal Terminal | 2023-02-16 | 6.5 Medium |
Several denial of service vulnerabilities exist in Eternal Terminal prior to version 6.2.0, including a DoS triggered remotely by an invalid sequence number and a local bug triggered by invalid input sent directly to the IPC socket. | ||||
CVE-2022-24951 | 1 Eternal Terminal Project | 1 Eternal Terminal | 2023-02-16 | 7.0 High |
A race condition exists in Eternal Terminal prior to version 6.2.0 which allows a local attacker to hijack Eternal Terminal's IPC socket, enabling access to Eternal Terminal clients which attempt to connect in the future. | ||||
CVE-2022-24950 | 1 Eternal Terminal Project | 1 Eternal Terminal | 2023-02-16 | 7.5 High |
A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId(). |
Page 1 of 1.