wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.
References
Configurations
History
20 Mar 2025, 17:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/03/27/5 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/6 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/7 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/8 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/27/9 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/1 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/2 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2024/03/28/3 - Mailing List, Patch, Third Party Advisory | |
References | () https://github.com/skyler-ferrante/CVE-2024-28085 - Exploit, Third Party Advisory | |
References | () https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq - Broken Link | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html - Mailing List, Third Party Advisory | |
References | () https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/ - Product | |
References | () https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt - Exploit, Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20240531-0003/ - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2024/03/27/5 - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:* |
|
First Time |
Kernel
Kernel util-linux Debian debian Linux Debian |
Information
Published : 2024-03-27 19:15
Updated : 2025-03-20 17:58
NVD link : CVE-2024-28085
Mitre link : CVE-2024-28085
CVE.ORG link : CVE-2024-28085
JSON object : View
Products Affected
debian
- debian_linux
kernel
- util-linux
CWE
CWE-150
Improper Neutralization of Escape, Meta, or Control Sequences