CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
28.8%
Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation
Vulnerability. This vulnerability allows local attackers to escalate
privileges on affected installations of Linux Kernel. An attacker must
first obtain the ability to execute high-privileged code on the target
system in order to exploit this vulnerability. The specific flaw exists
within the CMTP module. The issue results from the lack of validating the
existence of an object prior to performing further free operations on the
object. An attacker can leverage this vulnerability to escalate privileges
and execute code in the context of the kernel. Was ZDI-CAN-11977.
Author | Note |
---|---|
Priority reason: CAP_NET_ADMIN privileges are required | |
cascardo | to exploit this requires CAP_NET_ADMIN in the init namespace (init_ns): cmtp_add_connection is called from do_cmtp_sock_ioctl, with command CMTPCONNADD, which checks for capable(CAP_NET_ADMIN). |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-azure | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-bluefield | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gcp | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-gkeop | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-ibm | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-iot | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-kvm | <Â any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-oem-5.13 | <Â 5.13.0-1014.18 | UNKNOWN |