Vulnerability Details : CVE-2017-17087
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
Products affected by CVE-2017-17087
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
- cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-17087
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-17087
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2017-17087
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-17087
-
https://usn.ubuntu.com/4582-1/
USN-4582-1: Vim vulnerabilities | Ubuntu security notices | UbuntuThird Party Advisory
-
http://security.cucumberlinux.com/security/details.php?id=166
CLD-166 DetailsIssue Tracking;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
[SECURITY] [DLA 2876-1] vim security updateMailing List;Third Party Advisory
-
https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8
patch 8.0.1263: others can read the swap file if a user is careless · vim/vim@5a73e0c · GitHubPatch;Third Party Advisory
-
https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ
Security risk of vim swap files - Google GroepenIssue Tracking;Mailing List;Third Party Advisory
-
http://openwall.com/lists/oss-security/2017/11/27/2
oss-security - Re: Re: Security risk of server side text editing ...Mailing List
-
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html
[SECURITY] [DLA 1871-1] vim security updateMailing List;Third Party Advisory
Jump to