arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2481-1 | arpwatch security update |
Debian DSA |
DSA-2482-1 | arpwatch security update |
EUVD |
EUVD-2012-2639 | arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:42:31.777Z
Reserved: 2012-05-14T00:00:00
Link: CVE-2012-2653
No data.
Status : Deferred
Published: 2012-07-12T20:55:15.937
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-2653
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD