Vulnerability Details CVE-2020-36657
uptimed before 0.4.6-r1 on Gentoo allows local users (with access to the uptimed user account) to gain root privileges by creating a hard link within the /var/spool/uptimed directory, because there is an unsafe chown -R call.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 12.4%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2020-36657
-
cpe:2.3:a:uptimed_project:uptimed:-
-
cpe:2.3:a:uptimed_project:uptimed:0.3.10
-
cpe:2.3:a:uptimed_project:uptimed:0.3.11
-
cpe:2.3:a:uptimed_project:uptimed:0.3.12
-
cpe:2.3:a:uptimed_project:uptimed:0.3.13
-
cpe:2.3:a:uptimed_project:uptimed:0.3.14
-
cpe:2.3:a:uptimed_project:uptimed:0.3.15
-
cpe:2.3:a:uptimed_project:uptimed:0.3.16
-
cpe:2.3:a:uptimed_project:uptimed:0.3.17
-
cpe:2.3:a:uptimed_project:uptimed:0.3.18
-
cpe:2.3:a:uptimed_project:uptimed:0.3.3
-
cpe:2.3:a:uptimed_project:uptimed:0.3.4
-
cpe:2.3:a:uptimed_project:uptimed:0.3.5
-
cpe:2.3:a:uptimed_project:uptimed:0.3.6
-
cpe:2.3:a:uptimed_project:uptimed:0.3.7
-
cpe:2.3:a:uptimed_project:uptimed:0.3.8
-
cpe:2.3:a:uptimed_project:uptimed:0.3.9
-
cpe:2.3:a:uptimed_project:uptimed:0.4.0
-
cpe:2.3:a:uptimed_project:uptimed:0.4.1
-
cpe:2.3:a:uptimed_project:uptimed:0.4.2
-
cpe:2.3:a:uptimed_project:uptimed:0.4.3
-
cpe:2.3:a:uptimed_project:uptimed:0.4.4
-
cpe:2.3:a:uptimed_project:uptimed:0.4.5