Description
Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-14974 | Directory traversal vulnerability in the setuid root helper binary in S-nail (later S-mailx) before 14.8.16 allows local users to write to arbitrary files and consequently gain root privileges via a .. (dot dot) in the randstr argument. |
Ubuntu USN |
USN-4820-1 | S-nail vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T15:11:49.048Z
Reserved: 2017-02-07T00:00:00.000Z
Link: CVE-2017-5899
No data.
Status : Modified
Published: 2017-03-27T15:59:00.497
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-5899
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN