Botan is prone to a privilege escalation vulnerability in the es_unix module on Unix systems that do not support /dev/random. The source of this issue is that external programs may be called without fully qualifying the path to the file. In some situations, this could be leveraged to elevate privileges. This issue was reported by the vendor to exist in the 1.3.x development series of the software.
Botan is prone to a privilege escalation vulnerability in the es_unix module on Unix systems that do not support /dev/random. The source of this issue is that external programs may be called without fully qualifying the path to the file. In some situations, this could be leveraged to elevate privileges. This issue was reported by the vendor to exist in the 1.3.x development series of the software.