Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-1858
HistoryApr 05, 2013 - 12:00 a.m.

CVE-2013-1858

2013-04-0500:00:00
ubuntu.com
ubuntu.com
11

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

The clone system-call implementation in the Linux kernel before 3.8.3 does
not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags,
which allows local users to gain privileges by calling chroot and
leveraging the sharing of the / directory between a parent process and a
child process.

Bugs

Notes

Author Note
mdeslaur reproducer: http://stealth.openwall.net/xSports/clown-newuser.c
jdstrand this became privilege esclation when 5eaf563e53294d6696e651466697eb9d491f3946 removed the checks for CAP_SYS_ADMIN, CAP_SETUID and CAP_SETGID

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.1%

Related for UB:CVE-2013-1858