Lucene search

K
nvd[email protected]NVD:CVE-2018-13405
HistoryJul 06, 2018 - 2:29 p.m.

CVE-2018-13405

2018-07-0614:29:01
CWE-269
web.nvd.nist.gov
1

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%

The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.16
Node
debiandebian_linuxMatch8.0
OR
debiandebian_linuxMatch9.0
Node
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch16.04esm
OR
canonicalubuntu_linuxMatch16.04lts
OR
canonicalubuntu_linuxMatch18.04lts
Node
fedoraprojectfedoraMatch34
OR
fedoraprojectfedoraMatch35
Node
redhatmrg_realtimeMatch2.0
OR
redhatvirtualizationMatch4.0
OR
redhatenterprise_linux_ausMatch7.4
OR
redhatenterprise_linux_desktopMatch6.0
OR
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_eusMatch7.4
OR
redhatenterprise_linux_eusMatch7.5
OR
redhatenterprise_linux_for_real_timeMatch7
OR
redhatenterprise_linux_serverMatch6.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_server_ausMatch6.6
OR
redhatenterprise_linux_server_ausMatch7.2
OR
redhatenterprise_linux_server_ausMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.2
OR
redhatenterprise_linux_server_tusMatch7.3
OR
redhatenterprise_linux_server_tusMatch7.4
OR
redhatenterprise_linux_workstationMatch6.0
OR
redhatenterprise_linux_workstationMatch7.0
Node
f5big-ip_access_policy_managerRange13.0.013.1.3.5
OR
f5big-ip_access_policy_managerRange14.0.014.1.3.1
OR
f5big-ip_access_policy_managerRange15.0.015.0.1.4
OR
f5big-ip_access_policy_managerMatch15.1.0
OR
f5big-ip_access_policy_managerMatch16.0.0
OR
f5big-ip_advanced_firewall_managerRange13.0.013.1.3.5
OR
f5big-ip_advanced_firewall_managerRange14.0.014.1.3.1
OR
f5big-ip_advanced_firewall_managerRange15.0.015.0.1.4
OR
f5big-ip_advanced_firewall_managerMatch15.1.0
OR
f5big-ip_advanced_firewall_managerMatch16.0.0
OR
f5big-ip_analyticsRange13.0.013.1.3.5
OR
f5big-ip_analyticsRange14.0.014.1.3.1
OR
f5big-ip_analyticsRange15.0.015.0.1.4
OR
f5big-ip_analyticsMatch15.1.0
OR
f5big-ip_analyticsMatch16.0.0
OR
f5big-ip_application_acceleration_managerRange13.0.013.1.3.5
OR
f5big-ip_application_acceleration_managerRange14.0.014.1.3.1
OR
f5big-ip_application_acceleration_managerRange15.0.015.0.1.4
OR
f5big-ip_application_acceleration_managerMatch15.1.0
OR
f5big-ip_application_acceleration_managerMatch16.0.0
OR
f5big-ip_application_security_managerRange13.0.013.1.3.5
OR
f5big-ip_application_security_managerRange14.0.014.1.3.1
OR
f5big-ip_application_security_managerRange15.0.015.0.1.4
OR
f5big-ip_application_security_managerMatch15.1.0
OR
f5big-ip_application_security_managerMatch16.0.0
OR
f5big-ip_domain_name_systemRange13.0.013.1.3.5
OR
f5big-ip_domain_name_systemRange14.0.014.1.3.1
OR
f5big-ip_domain_name_systemRange15.0.015.0.1.4
OR
f5big-ip_domain_name_systemMatch15.1.0
OR
f5big-ip_domain_name_systemMatch16.0.0
OR
f5big-ip_edge_gatewayRange13.0.013.1.3.5
OR
f5big-ip_edge_gatewayRange14.0.014.1.3.1
OR
f5big-ip_edge_gatewayRange15.0.015.0.1.4
OR
f5big-ip_edge_gatewayMatch15.1.0
OR
f5big-ip_edge_gatewayMatch16.0.0
OR
f5big-ip_fraud_protection_serviceRange13.0.013.1.3.5
OR
f5big-ip_fraud_protection_serviceRange14.0.014.1.3.1
OR
f5big-ip_fraud_protection_serviceRange15.0.015.0.1.4
OR
f5big-ip_fraud_protection_serviceMatch15.1.0
OR
f5big-ip_fraud_protection_serviceMatch16.0.0
OR
f5big-ip_global_traffic_managerRange13.0.013.1.3.5
OR
f5big-ip_global_traffic_managerRange14.0.014.1.3.1
OR
f5big-ip_global_traffic_managerRange15.0.015.0.1.4
OR
f5big-ip_global_traffic_managerMatch15.1.0
OR
f5big-ip_global_traffic_managerMatch16.0.0
OR
f5big-ip_link_controllerRange13.0.013.1.3.5
OR
f5big-ip_link_controllerRange14.0.014.1.3.1
OR
f5big-ip_link_controllerRange15.0.015.0.1.4
OR
f5big-ip_link_controllerMatch15.1.0
OR
f5big-ip_link_controllerMatch16.0.0
OR
f5big-ip_local_traffic_managerRange13.0.013.1.3.5
OR
f5big-ip_local_traffic_managerRange14.0.014.1.3.1
OR
f5big-ip_local_traffic_managerRange15.0.015.0.1.4
OR
f5big-ip_local_traffic_managerMatch15.1.0
OR
f5big-ip_local_traffic_managerMatch16.0.0
OR
f5big-ip_policy_enforcement_managerRange13.0.013.1.3.5
OR
f5big-ip_policy_enforcement_managerRange14.0.014.1.3.1
OR
f5big-ip_policy_enforcement_managerRange15.0.015.0.1.4
OR
f5big-ip_policy_enforcement_managerMatch15.1.0
OR
f5big-ip_policy_enforcement_managerMatch16.0.0
OR
f5big-ip_webacceleratorRange13.0.013.1.3.5
OR
f5big-ip_webacceleratorRange14.0.014.1.3.1
OR
f5big-ip_webacceleratorRange15.0.015.0.1.4
OR
f5big-ip_webacceleratorMatch15.1.0
OR
f5big-ip_webacceleratorMatch16.0.0

References

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%