Vulnerability Details : CVE-2015-5228
The service daemon in CRIU creates log and dump files insecurely, which allows local users to create arbitrary files and take ownership of existing files via unspecified vectors related to a directory path.
Products affected by CVE-2015-5228
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
- cpe:2.3:a:criu:checkpoint\/restore_in_userspace:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5228
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5228
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2015-5228
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5228
-
http://lists.opensuse.org/opensuse-updates/2015-09/msg00030.html
openSUSE-SU-2015:1593-1: moderate: Security update for criu
-
https://bugzilla.redhat.com/show_bug.cgi?id=1255782
1255782 – (CVE-2015-5228) CVE-2015-5228 criu: arbitrary file creation and chown
-
https://lists.openvz.org/pipermail/criu/2015-August/021847.html
[CRIU] Hardening the criu service daemonVendor Advisory
-
http://www.openwall.com/lists/oss-security/2015/08/25/5
oss-security - CVE-2015-5228 & CVE-2015-5231 in the criu service daemon
Jump to