Vulnerability Details : CVE-2021-43413
Potential exploit
An issue was discovered in GNU Hurd before 0.9 20210404-9. A single pager port is shared among everyone who mmaps a file, allowing anyone to modify any files that they can read. This can be trivially exploited to get full root access.
Products affected by CVE-2021-43413
- cpe:2.3:a:gnu:hurd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-43413
1.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-43413
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2021-43413
-
https://lists.gnu.org/archive/html/bug-hurd/2005-06/msg00191.html
Re: [PATCH] proxy memory objectMailing List;Vendor Advisory
-
https://www.mail-archive.com/bug-hurd@gnu.org/msg32113.html
[VULN 2/4] No read-only mappingsVendor Advisory
-
https://lists.gnu.org/archive/html/bug-hurd/2021-05/msg00079.html
How do I disclose a vulnerability?Exploit;Mailing List;Vendor Advisory
-
https://lists.gnu.org/archive/html/bug-hurd/2002-11/msg00263.html
Re: proxy memory objects patchMailing List;Vendor Advisory
Jump to