CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
5.1%
In Ubuntu’s accountsservice an unprivileged local attacker can trigger a use-after-free vulnerability in accountsservice by sending a D-Bus message to the accounts-daemon process.
Vendor | Product | Version | CPE |
---|---|---|---|
canonical | accountsservice | * | cpe:2.3:a:canonical:accountsservice:*:*:*:*:*:*:*:* |
linux | linux_kernel | - | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 23.04 | cpe:2.3:o:canonical:ubuntu_linux:23.04:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 22.10 | cpe:2.3:o:canonical:ubuntu_linux:22.10:*:*:*:-:*:*:* |
canonical | ubuntu_linux | 22.04 | cpe:2.3:o:canonical:ubuntu_linux:22.04:*:*:*:lts:*:*:* |
canonical | ubuntu_linux | 20.04 | cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* |
[
{
"vendor": "Canonical Ltd.",
"product": "AccountService",
"platforms": [
"Linux"
],
"collectionURL": "https://launchpad.net/ubuntu/+source/accountsservice",
"packageName": "accountservice",
"versions": [
{
"status": "unaffected",
"version": "23.13.9-2ubuntu2"
}
]
}
]