Vulnerability Details : CVE-2015-1591
The kamailio build in kamailio before 4.2.0-2 process allows local users to gain privileges.
Products affected by CVE-2015-1591
- cpe:2.3:a:kamailio:kamailio:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1591
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 16 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1591
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2015-1591
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1591
-
https://github.com/kamailio/kamailio/issues/48
multiple /tmp file vulnerabilities · Issue #48 · kamailio/kamailio · GitHubThird Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775681
#775681 - kamailio: multiple /tmp file vulnerabilities (CVE-2015-1590 CVE-2015-1591) - Debian Bug report logsMailing List;Third Party Advisory
-
http://cve.killedkenny.io/cve/CVE-2015-1591
** RESERVED ** · CVE-2015-1591Third Party Advisory
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?msg=17;filename=0001-fix-fifo-and-ctl-defaults-pointing-to-unsecure-tmp-d.patch;att=1;bug=775681
Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/02/12/7
oss-security - Re: kamailio: multiple /tmp file vulnerabilitiesMailing List;Third Party Advisory
-
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1591.html
CVE-2015-1591 in UbuntuThird Party Advisory
Jump to