A vulnerability was found in networkd-dispatcher. This flaw exists because no functions are sanitized by the OperationalState or the AdministrativeState of networkd-dispatcher. This attack leads to a directory traversal to escape from the “/etc/networkd-dispatcher” base directory.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/ | Exploit Patch Technical Description Vendor Advisory | 
| https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/ | Exploit Patch Technical Description Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 06:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/ - Exploit, Patch, Technical Description, Vendor Advisory | 
Information
                Published : 2022-09-21 19:15
Updated : 2025-05-27 21:15
NVD link : CVE-2022-29799
Mitre link : CVE-2022-29799
CVE.ORG link : CVE-2022-29799
JSON object : View
Products Affected
                microsoft
- windows_defender_for_endpoint
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
