CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
Severity: High
Date : 2017-05-22
CVE-ID : CVE-2017-8108
Package : lynis
Type : arbitrary file overwrite
Remote : No
Link : https://security.archlinux.org/AVG-278
The package lynis before version 2.5.0-1 is vulnerable to arbitrary
file overwrite.
Upgrade to 2.5.0-1.
The problem has been fixed upstream in version 2.5.0.
None.
Michael Scherer discovered that some Lynis tests reuse the same
temporary file. As some tests remove the temporary file, this might
give an attacker the possibility to perform a link following attack.
While timing must be perfect, there is a very small time window in
which the attack can recreate the temporary file and symlink it to
another resource, like a file. In this case data may be overwritten, or
possibly executed.
A local unprivileged attacker is able to overwrite arbitrary files on
the filesystem possibly leading to privilege escalation.
https://bugs.archlinux.org/task/54067
https://cisofy.com/security/cve/cve-2017-8108/
https://security.archlinux.org/CVE-2017-8108
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%