Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-7738
HistoryMar 07, 2018 - 12:00 a.m.

CVE-2018-7738

2018-03-0700:00:00
ubuntu.com
ubuntu.com
5

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%

In util-linux before 2.32-rc1, bash-completion/umount allows local users to
gain privileges by embedding shell commands in a mountpoint name, which is
mishandled during a umount command (within Bash) by a different user, as
demonstrated by logging in as root and entering umount followed by a tab
character for autocompletion.

Bugs

Notes

Author Note
sbeattie bash completion for umount moved from bash-completion to util-linux in util-linux 2.28-1
mdeslaur script in xenial bash-completion package isn’t vulnerable bash-completion package in bionic+ doesn’t contain the umount helper
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchutil-linux< 2.31.1-0.4ubuntu3.7UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.2%