Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2856

Опубликовано: 14 мар. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2
CVSS3: 8.4

Описание

pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

released

2.19-0ubuntu6.8
precise

released

2.15-0ubuntu10.14
precise/esm

not-affected

2.15-0ubuntu10.14
trusty

released

2.19-0ubuntu6.8
trusty/esm

released

2.19-0ubuntu6.8
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

2.23-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

2.23-0ubuntu1
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

ignored

end of life
vivid/ubuntu-core

released

2.21-0ubuntu4.0.7

Показывать по

EPSS

Процентиль: 71%
0.00684
Низкий

7.2 High

CVSS2

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.4
nvd
почти 10 лет назад

pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.

CVSS3: 8.4
debian
почти 10 лет назад

pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; ...

CVSS3: 8.4
github
больше 3 лет назад

pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk. NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.

fstec
почти 10 лет назад

Уязвимость библиотеки исполнения glibc, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 71%
0.00684
Низкий

7.2 High

CVSS2

8.4 High

CVSS3