Description
An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-20536 | An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch. |
References
| Link | Providers |
|---|---|
| https://git.lsd.cat/g/pax-pwn |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:33:56.924Z
Reserved: 2020-11-01T00:00:00.000Z
Link: CVE-2020-28046
No data.
Status : Modified
Published: 2020-11-02T21:15:31.617
Modified: 2024-11-21T05:22:16.540
Link: CVE-2020-28046
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD