Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-6964
HistoryMar 27, 2017 - 12:00 a.m.

CVE-2017-6964

2017-03-2700:00:00
ubuntu.com
ubuntu.com
12

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

25.1%

dmcrypt-get-device, as shipped in the eject package of Debian and Ubuntu,
does not check the return value of the (1) setuid or (2) setgid function,
which might cause dmcrypt-get-device to execute code, which was intended to
run as an unprivileged user, as root. This affects eject through
2.1.5+deb1+cvs20081104-13.1 on Debian, eject before
2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1 on Ubuntu 16.10, eject before
2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1 on Ubuntu 16.04 LTS, eject
before 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1 on Ubuntu 14.04 LTS, and
eject before 2.1.5+deb1+cvs20081104-9ubuntu0.1 on Ubuntu 12.04 LTS.

Bugs

Notes

Author Note
tyhicks The dmcrypt-get-device binary is built from a patch the Debian/Ubuntu carry. It isn’t likely to affect other distros.
OSVersionArchitecturePackageVersionFilename
ubuntu12.04noarcheject< 2.1.5+deb1+cvs20081104-9ubuntu0.1UNKNOWN
ubuntu14.04noarcheject< 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1UNKNOWN
ubuntu16.04noarcheject< 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1UNKNOWN
ubuntu16.10noarcheject< 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1UNKNOWN
ubuntu17.04noarcheject< 2.1.5+deb1+cvs20081104-13.2UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

25.1%