Vulnerability CVE-2014-4014


Published: 2014-06-23

Description:
The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.

See advisories in our WLB2 database:
Topic
Author
Date
High
Linux Kernel user namespace bug
Andy
11.06.2014
Med.
Linux Kernel user namespace Local Privilege Escalation PoC
Vitaly Nikolenko
22.06.2014

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:H/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.2/10
10/10
1.9/10
Exploit range
Attack complexity
Authentication
Local
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Linux -> Linux kernel 

 References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=23adbe12ef7d3d4195e80800ab36b37bee28cd03
http://secunia.com/advisories/59220
http://www.exploit-db.com/exploits/33824
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.8
http://www.openwall.com/lists/oss-security/2014/06/10/4
http://www.securityfocus.com/bid/67988
http://www.securitytracker.com/id/1030394
https://bugzilla.redhat.com/show_bug.cgi?id=1107966
https://github.com/torvalds/linux/commit/23adbe12ef7d3d4195e80800ab36b37bee28cd03
https://source.android.com/security/bulletin/2016-12-01.html

Copyright 2024, cxsecurity.com

 

Back to Top