A highly privileged user can exploit SUID-root program to escalate his privileges to root on a local Unix system.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Adaptive_server_enterprise | Sap | 16.0 (including) | 16.0 (including) |
Adaptive_server_enterprise | Sap | kernel_7.22 (including) | kernel_7.22 (including) |
Adaptive_server_enterprise | Sap | kernel_7.49 (including) | kernel_7.49 (including) |
Adaptive_server_enterprise | Sap | kernel_7.53 (including) | kernel_7.53 (including) |
Adaptive_server_enterprise | Sap | krnl64nuc_7.22 (including) | krnl64nuc_7.22 (including) |
Adaptive_server_enterprise | Sap | krnl64nuc_7.22ext (including) | krnl64nuc_7.22ext (including) |
Adaptive_server_enterprise | Sap | krnl64nuc_7.49 (including) | krnl64nuc_7.49 (including) |
Adaptive_server_enterprise | Sap | krnl64uc_7.22 (including) | krnl64uc_7.22 (including) |
Adaptive_server_enterprise | Sap | krnl64uc_7.22ext (including) | krnl64uc_7.22ext (including) |
Adaptive_server_enterprise | Sap | krnl64uc_7.49 (including) | krnl64uc_7.49 (including) |
Adaptive_server_enterprise | Sap | krnl64uc_7.53 (including) | krnl64uc_7.53 (including) |