Vulnerability Details : CVE-2015-1336
The daily mandb cleanup job in Man-db before 2.7.6.1-1 as packaged in Ubuntu and Debian allows local users with access to the man account to gain privileges via vectors involving insecure chown use.
Vulnerability category: BypassGain privilege
Products affected by CVE-2015-1336
- cpe:2.3:a:man-db_project:man-db:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-1336
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1336
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2015-1336
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1336
-
https://security.gentoo.org/glsa/201707-12
MAN DB: Privilege escalation (GLSA 201707-12) β Gentoo securityIssue Tracking;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/140759/Man-db-2.6.7.1-Privilege-Escalation.html
Man-db 2.6.7.1 Privilege Escalation β Packet StormExploit;Third Party Advisory;VDB Entry
-
https://bugs.launchpad.net/ubuntu/+source/man-db/+bug/1482786
Bug #1482786 βman-db daily cron job TOCTOU bug when processing c...β : Bugs : man-db package : UbuntuIssue Tracking;Third Party Advisory
-
http://www.halfdog.net/Security/2015/MandbSymlinkLocalRootPrivilegeEscalation/
Mandb Cron Job Symlink Local Root Privilege EscalationExploit;Third Party Advisory
-
http://www.securityfocus.com/bid/79723
Ubuntu Vivid CVE-2015-1336 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840357
#840357 - CVE-2015-1336 - Debian Bug report logsIssue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/12/14/11
oss-security - Re: User man Local Root Exploit/Linux Kernel setgid Directory Privilege Escalation/PAM Owner Check WeaknessMailing List;Third Party Advisory;VDB Entry
-
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1336.html
CVE-2015-1336 in UbuntuThird Party Advisory
Jump to