Lucene search

K
archlinuxArchLinuxASA-202105-21
HistoryMay 25, 2021 - 12:00 a.m.

[ASA-202105-21] dotnet-runtime: privilege escalation

2021-05-2500:00:00
security.archlinux.org
197
dotnet-runtime
privilege escalation
cve-2021-31204
resolution
5.0.6.sdk203-1
elevation of privilege
linux
macos
.net 5.0
.net core 3.1

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

53.4%

Arch Linux Security Advisory ASA-202105-21

Severity: Medium
Date : 2021-05-25
CVE-ID : CVE-2021-31204
Package : dotnet-runtime
Type : privilege escalation
Remote : No
Link : https://security.archlinux.org/AVG-1944

Summary

The package dotnet-runtime before version 5.0.6.sdk203-1 is vulnerable
to privilege escalation.

Resolution

Upgrade to 5.0.6.sdk203-1.

pacman -Syu “dotnet-runtime>=5.0.6.sdk203-1”

The problem has been fixed upstream in version 5.0.6.sdk203.

Workaround

None.

Description

An elevation of privilege vulnerability exists in .NET 5.0 and .NET
Core 3.1 when a user runs a single file application on operating
systems based on Linux or macOS. The issue is fixed in .NET 5.0,
Runtime 5.0.6 and SDK 5.0.203, as well as .NET Core 3.1, Runtime 3.1.15
and SDK 3.1.115.

Impact

An attacker could elevate privileges from a crafted single file
application.

References

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31204
https://github.com/dotnet/announcements/issues/185
https://security.archlinux.org/CVE-2021-31204

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanydotnet-runtime< 5.0.6.sdk203-1UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

53.4%