8.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
48.7%
mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
lists.fedoraproject.org/pipermail/package-announce/2016-February/177359.html
lists.fedoraproject.org/pipermail/package-announce/2016-February/177396.html
lists.opensuse.org/opensuse-updates/2016-01/msg00091.html
lists.opensuse.org/opensuse-updates/2016-01/msg00118.html
lists.opensuse.org/opensuse-updates/2016-02/msg00004.html
www.debian.org/security/2016/dsa-3450
www.openwall.com/lists/oss-security/2016/01/20/6
www.securitytracker.com/id/1034791
www.ubuntu.com/usn/USN-2876-1
bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/870
bugs.launchpad.net/ecryptfs/+bug/1530566
8.4 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
48.7%