Please submit a pull request if you have corrections or know about any other unfixed security bugs.
-
When running
sudo -u non-root-user
as root,TIOCSTI
allows thecommand
insudo -u non-root-user command
to execute anything as root. Can be fixed withDefaults use_pty
insudoers
. More notes. -
sudo credential caching (generally enabled by default; disabled with
Defaults timestamp_timeout=0
) allows any process in a TTY to do a passwordless sudo within the timeout period, not just commands that you've prefixed withsudo
in the shell.
- Unlike VMware Workstation, VirtualBox clipboard sharing gives guests continuous access to the host clipboard, instead of just when the VM is focused.
- Unlike VMware Workstation, virt-manager/spice-gtk clipboard sharing gives guests continuous access to the host clipboard, instead of just when the VM is focused. This clipboard sharing feature is unconditionally enabled without warning. A compromised guest with no need for clipboard access can install
spice-vdagent
and start continuously sniffing the host clipboard.
- Any program connected to the server can sniff another program's keystrokes. Solved in Wayland.
-
You can crash a distributed Erlang node by making ~1M connections with an invalid security cookie
-
Check for null bytes in binaries / strings when opening files (to be fixed in OTP 21.0)
-
Credentials materials are compared unsafely throughout Twisted, still open due to the difficulty of measuring whether the constant-time compare function actually fixes anything.
-
twisted.web has no protection against HTTP response-splitting attacks
- These packages exist in a state of permanent insecurity because they don't keep up with the ~6-week browser update cycle. (e.g. take any one of the many WebKit security bugs fixed after the last release of these packages, which could be a ~year old.)
-
Windows Defender's malware emulator is unsandboxed and runs with SYSTEM privileges
-
Various methods of automatically bypassing UAC (see "Unfixed methods in upcoming Windows 10 RS2 release")