Vulnerability Details : CVE-2017-18078
Potential exploit
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.
Products affected by CVE-2017-18078
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
- cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-18078
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 43 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-18078
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-18078
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-18078
-
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
Third Party Advisory
-
https://www.exploit-db.com/exploits/43935/
systemd (systemd-tmpfiles) < 236 - 'fs.protected_hardlinks=0' Local Privilege EscalationExploit;Third Party Advisory;VDB Entry
-
https://www.openwall.com/lists/oss-security/2018/01/29/4
oss-security - Re: CVE-2017-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0Mailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2018-02/msg00109.html
openSUSE-SU-2018:0560-1: moderate: Security update for systemdMailing List;Third Party Advisory
-
https://github.com/systemd/systemd/issues/7736
tmpfiles: unsafe handling of hard links and a race condition · Issue #7736 · systemd/systemd · GitHubExploit;Issue Tracking;Third Party Advisory
-
http://packetstormsecurity.com/files/146184/systemd-Local-Privilege-Escalation.html
systemd Local Privilege Escalation ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html
[SECURITY] [DLA 1762-1] systemd security updateMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2018/01/29/3
oss-security - CVE-2018-18078: systemd-tmpfiles root privilege escalation with fs.protected_hardlinks=0Exploit;Mailing List;Third Party Advisory
-
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
[GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8 - Pony MailThird Party Advisory
Jump to