CVE-2024-28085

3.3 LOW
Published: March 27, 2024 Modified: November 04, 2025

Description

wall in util-linux through 2.40, often installed with setgid tty permissions, allows escape sequences to be sent to other users' terminals through argv. (Specifically, escape sequences received from stdin are blocked, but escape sequences received from argv are not blocked.) There may be plausible scenarios where this leads to account takeover.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/5
Source: cve@mitre.org
Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/6
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/7
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/8
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/9
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/28/1
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/28/2
Source: cve@mitre.org
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/28/3
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
https://github.com/skyler-ferrante/CVE-2024-28085
Source: cve@mitre.org
Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
Source: cve@mitre.org
Mailing List Third Party Advisory
https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
Source: cve@mitre.org
Exploit Third Party Advisory
https://security.netapp.com/advisory/ntap-20240531-0003/
Source: cve@mitre.org
Third Party Advisory
https://www.openwall.com/lists/oss-security/2024/03/27/5
Source: cve@mitre.org
Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Mar/35
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openwall.com/lists/oss-security/2024/03/27/5
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/6
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/7
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/8
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/27/9
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/28/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/28/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/03/28/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
https://github.com/skyler-ferrante/CVE-2024-28085
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/
Source: af854a3a-2127-422b-91ae-364da2661108
Product
https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://security.netapp.com/advisory/ntap-20240531-0003/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.openwall.com/lists/oss-security/2024/03/27/5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory

31 reference(s) from NVD

Quick Stats

CVSS v3 Score
3.3 / 10.0
EPSS (Exploit Probability)
12.7%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian kernel