header-logo
Suggest Exploit
vendor:
N/A
by:
SecurityFocus
7.2
CVSS
HIGH
/etc/crash setgid kmem
264
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
1998

/etc/crash setgid kmem

The /etc/crash program was installed with setgid kmem and was executable by anyone. This allowed any user to use the ! shell command escape to execute commands with group set to kmem.

Mitigation:

Remove the setgid bit from the /etc/crash program.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/59/info

/etc/crash was installed setgid kmem and excutable by anyone. Any user can use the ! shell command escape to executes commands, which are then performed with group set to kmem.

$ /etc/crash
! sh