4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
0.4%
The inode_init_owner function in fs/inode.c in the Linux kernel through
3.16 allows local users to create files with an unintended group ownership,
in a scenario where a directory is SGID to a certain group and is writable
by a user who is not a member of that group. Here, the non-member can
trigger creation of a plain file whose group ownership is that group. The
intended behavior was that the non-member can trigger creation of a
directory (but not a plain file) whose group ownership is that group. The
non-member can escalate privileges by making the plain file executable and
SGID.
Author | Note |
---|---|
tyhicks | While inode_init_owner() has only been vulnerable since its introduction in a1bd120d13e586ea1c424048fd2c8420a442852a, this flaw has been present in individual filesystems since the beginning of the kernel git history. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < 4.15.0-33.36 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < 3.13.0-157.207 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-134.160 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1020.20 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1028.31 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1066.76 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-azure | < 4.15.0-1022.23 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.15.0-1022.22~16.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure-edge | < 4.15.0-1022.23 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp | < 4.15.0-1018.19 | UNKNOWN |
git.kernel.org/linux/0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7
launchpad.net/bugs/cve/CVE-2018-13405
nvd.nist.gov/vuln/detail/CVE-2018-13405
security-tracker.debian.org/tracker/CVE-2018-13405
twitter.com/grsecurity/status/1015082951204327425
ubuntu.com/security/notices/USN-3752-1
ubuntu.com/security/notices/USN-3752-2
ubuntu.com/security/notices/USN-3752-3
ubuntu.com/security/notices/USN-3753-1
ubuntu.com/security/notices/USN-3753-2
ubuntu.com/security/notices/USN-3754-1
www.cve.org/CVERecord?id=CVE-2018-13405
www.halfdog.net/Security/2015/SetgidDirectoryPrivilegeEscalation/
4.6 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
0.4%