7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
USN-6166-1 fixed a vulnerability in libcap2. This update provides
the corresponding update for Ubuntu 14.04 ESM, Ubuntu 16.04 ESM
and Ubuntu 18.04 ESM.
Original advisory details:
Richard Weinberger discovered that libcap2 incorrectly handled certain long
input strings. An attacker could use this issue to cause libcap2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2023-2603)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | libcap2 | < 1:2.25-1.2ubuntu0.1~esm1 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcap-dev | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcap2 | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcap2-bin | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcap2-bin-dbgsym | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcap2-dbgsym | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcap2-udeb | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libpam-cap | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libpam-cap-dbgsym | < 1:2.25-1.2 | UNKNOWN |
Ubuntu | 18.04 | noarch | libcap2-bin | < 1:2.25-1.2ubuntu0.1~esm1 | UNKNOWN |
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%