Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2019-13313
libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.0
EPSS Ranking
13.1%
CVSS Severity
CVSS v3 Score
7.8
CVSS v2 Score
2.1
References
http://www.openwall.com/lists/oss-security/2019/07/08/3
https://access.redhat.com/errata/RHSA-2019:3387
https://gitlab.com/libosinfo/libosinfo/-/tags
https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS
https://libosinfo.org/download/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AZU4IPPIR73NYC6E733QR26O5ZI6MMKJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEZUZKC6YK4E3NXM7XKZOXY5X5PJSPIR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4AD73NGYBV7GYT4LFC3TC7AYBWOJTG4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT44EYZZQFTK7XM6GKCYC4WUE7HYZVXM/
https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html
http://www.openwall.com/lists/oss-security/2019/07/08/3
https://access.redhat.com/errata/RHSA-2019:3387
https://gitlab.com/libosinfo/libosinfo/-/tags
https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS
https://libosinfo.org/download/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AZU4IPPIR73NYC6E733QR26O5ZI6MMKJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EEZUZKC6YK4E3NXM7XKZOXY5X5PJSPIR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4AD73NGYBV7GYT4LFC3TC7AYBWOJTG4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HT44EYZZQFTK7XM6GKCYC4WUE7HYZVXM/
https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html
Products affected by CVE-2019-13313
Libosinfo
»
Libosinfo
»
Version:
1.5.0
cpe:2.3:a:libosinfo:libosinfo:1.5.0
Fedoraproject
»
Fedora
»
Version:
29
cpe:2.3:o:fedoraproject:fedora:29
Fedoraproject
»
Fedora
»
Version:
30
cpe:2.3:o:fedoraproject:fedora:30
Redhat
»
Enterprise Linux
»
Version:
8.0
cpe:2.3:o:redhat:enterprise_linux:8.0
Redhat
»
Enterprise Linux Eus
»
Version:
8.1
cpe:2.3:o:redhat:enterprise_linux_eus:8.1
Redhat
»
Enterprise Linux Eus
»
Version:
8.2
cpe:2.3:o:redhat:enterprise_linux_eus:8.2
Redhat
»
Enterprise Linux Eus
»
Version:
8.4
cpe:2.3:o:redhat:enterprise_linux_eus:8.4
Redhat
»
Enterprise Linux Eus
»
Version:
8.6
cpe:2.3:o:redhat:enterprise_linux_eus:8.6
Redhat
»
Enterprise Linux Server Aus
»
Version:
8.2
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2
Redhat
»
Enterprise Linux Server Aus
»
Version:
8.4
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4
Redhat
»
Enterprise Linux Server Aus
»
Version:
8.6
cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6
Redhat
»
Enterprise Linux Server Tus
»
Version:
8.2
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2
Redhat
»
Enterprise Linux Server Tus
»
Version:
8.4
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4
Redhat
»
Enterprise Linux Server Tus
»
Version:
8.6
cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved