Description
The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-6694 | The mkdumprd script called "dracut" in the current working directory "." allows local users to trick the administrator into executing code as root. |
References
History
No history.
Status: PUBLISHED
Assigner: microfocus
Published:
Updated: 2024-08-06T01:15:10.555Z
Reserved: 2016-06-23T00:00:00.000Z
Link: CVE-2016-5759
No data.
Status : Modified
Published: 2017-09-08T18:29:00.267
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-5759
OpenCVE Enrichment
No data.
Weaknesses
EUVD