Vulnerability Details : CVE-2017-5207
Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument.
Products affected by CVE-2017-5207
- cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-5207
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 7 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-5207
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2017-5207
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-5207
-
http://www.securityfocus.com/bid/97385
Firejail CVE-2017-5207 Local Privilege Escalation VulnerabilityThird Party Advisory;VDB Entry
-
https://firejail.wordpress.com/download-2/release-notes/
Release Notes | FirejailRelease Notes;Vendor Advisory
-
https://security.gentoo.org/glsa/201701-62
Firejail: Multiple vulnerabilities (GLSA 201701-62) — Gentoo securityPatch;Third Party Advisory;VDB Entry
-
https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc
security fix · netblue30/firejail@5d43fdc · GitHubIssue Tracking;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2017/01/07/6
oss-security - Re: Firejail local root exploitMailing List;Patch;Third Party Advisory
-
https://github.com/netblue30/firejail/issues/1023
Root shell via --bandwidth and --shell · Issue #1023 · netblue30/firejail · GitHubIssue Tracking;Patch;Third Party Advisory
Jump to