Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-10600

Опубликовано: 11 июл. 2017
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 4.6
CVSS3: 5.9

Описание

ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.

РелизСтатусПримечание
devel

released

1.1+17.10ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/xenial

ignored

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

1.1
vivid/ubuntu-core

DNE

xenial

ignored

yakkety

released

1.0+16.10ubuntu1.1

Показывать по

EPSS

Процентиль: 14%
0.00046
Низкий

4.6 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
больше 8 лет назад

ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.

CVSS3: 5.9
github
больше 3 лет назад

ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.

EPSS

Процентиль: 14%
0.00046
Низкий

4.6 Medium

CVSS2

5.9 Medium

CVSS3