CVE-2020-28046

An issue was discovered in ProlinOS through 2.4.161.8859R. An attacker with local code execution privileges as a normal user (MAINAPP) can escalate to root privileges by exploiting the setuid installation of the xtables-multi binary and leveraging the ip6tables --modprobe switch.
References
Link Resource
https://git.lsd.cat/g/pax-pwn Exploit Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:pax:prolinos:*:*:*:*:*:*:*:*

Information

Published : 2020-11-02 13:15

Updated : 2020-11-17 08:44


NVD link : CVE-2020-28046

Mitre link : CVE-2020-28046


JSON object : View

CWE
CWE-269

Improper Privilege Management

Advertisement

dedicated server usa

Products Affected

pax

  • prolinos