Vulnerability Details : CVE-2022-24949
A privilege escalation to root exists in Eternal Terminal prior to version 6.2.0. This is due to the combination of a race condition, buffer overflow, and logic bug all in PipeSocketHandler::listen().
Vulnerability category: OverflowGain privilege
Products affected by CVE-2022-24949
- cpe:2.3:a:eternal_terminal_project:eternal_terminal:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24949
0.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 37 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24949
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST |
CWE ids for CVE-2022-24949
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by:
- cve-assign@fb.com (Secondary)
- nvd@nist.gov (Primary)
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by:
- cve-assign@fb.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2022-24949
-
https://github.com/MisterTea/EternalTerminal/commit/900348bb8bc96e1c7ba4888ac8480f643c43d3c3
red fixes (#468) · MisterTea/EternalTerminal@900348b · GitHubPatch;Third Party Advisory
-
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-hxg8-4r3q-p9rv
Eternal Terminal Root Privilege Escalation · Advisory · metaredteam/external-disclosures · GitHubExploit;Third Party Advisory
Jump to