CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
Severity: High
Date : 2017-05-10
CVE-ID : CVE-2017-8849
Package : smb4k
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-268
The package smb4k before version 2.0.0-2 is vulnerable to privilege
escalation.
Upgrade to 2.0.0-2.
The problem has been fixed upstream but no release is available yet.
None.
Smb4k <= 2.0.0 contains a logic flaw in which mount helper binary does
not properly verify the mount command it is being asked to run. This
allows calling any other binary as root since the mount helper is
typically installed as suid.
A local, unprivileged attacker can escalate privileges to become root
on the affected host.
https://www.kde.org/info/security/advisory-20170510-2.txt
http://seclists.org/oss-sec/2017/q2/240
https://commits.kde.org/smb4k/a90289b0962663bc1d247bbbd31b9e65b2ca000e
https://security.archlinux.org/CVE-2017-8849
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%