← Volver a CVEs
CVE-2024-6126
LOW3.2
Descripcion
A flaw was found in the cockpit package. This flaw allows an authenticated user to kill any process when enabling the pam_env's user_readenv option, which leads to a denial of service (DoS) attack.
Detalles CVE
Puntuacion CVSS v3.13.2
SeveridadLOW
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:L
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioREQUIRED
Publicado7/3/2024
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-400
Referencias
https://access.redhat.com/errata/RHSA-2024:9325(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(secalert@redhat.com)
https://access.redhat.com/security/cve/CVE-2024-6126(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=2292897(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.