Lucene search

K
archlinuxArchLinuxASA-202105-21
HistoryMay 25, 2021 - 12:00 a.m.

[ASA-202105-21] dotnet-runtime: privilege escalation

2021-05-2500:00:00
security.archlinux.org
193

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

49.0%

Arch Linux Security Advisory ASA-202105-21

Severity: Medium
Date : 2021-05-25
CVE-ID : CVE-2021-31204
Package : dotnet-runtime
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-1944

Summary

The package dotnet-runtime before version 5.0.6.sdk203-1 is vulnerable
to privilege escalation.

Resolution

Upgrade to 5.0.6.sdk203-1.

pacman -Syu “dotnet-runtime>=5.0.6.sdk203-1”

The problem has been fixed upstream in version 5.0.6.sdk203.

Workaround

None.

Description

An elevation of privilege vulnerability exists in .NET 5.0 and .NET
Core 3.1 when a user runs a single file application on operating
systems based on Linux or macOS. The issue is fixed in .NET 5.0,
Runtime 5.0.6 and SDK 5.0.203, as well as .NET Core 3.1, Runtime 3.1.15
and SDK 3.1.115.

Impact

An attacker could elevate privileges from a crafted single file
application.

References

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31204
https://github.com/dotnet/announcements/issues/185
https://security.archlinux.org/CVE-2021-31204

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanydotnet-runtime< 5.0.6.sdk203-1UNKNOWN

7.3 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

49.0%