Vulnerability Name:

CVE-2018-1063

Assigned:2017-12-04
Published:2018-02-28
Updated:2018-04-11
Summary:Context relabeling of filesystems is vulnerable to symbolic link attack, allowing a local, unprivileged malicious entity to change the SELinux context of an arbitrary file to a context with few restrictions. This only happens when the relabeling process is done, usually when taking SELinux state from disabled to enable (permissive or enforcing). The issue was found in policycoreutils 2.5-11.
CVSS v3 Severity:4.4 Medium (CVSS v3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)
3.8 Low (Temporal CVSS v3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:W/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
3.3 Low (CCN CVSS v3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
2.8 Low (CCN Temporal CVSS v3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:W/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
3.9 Low (REDHAT CVSS v3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)
3.4 Low (REDHAT Temporal CVSS v3 Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N/E:U/RL:W/RC:R)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
1.7 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-59
CWE-59
CWE-282
References:Source: REDHAT
Type: UNKNOWN
RHSA-2018:0913

Source: CONFIRM
Type: VENDOR_ADVISORY
https://bugzilla.redhat.com/show_bug.cgi?id=1550122

Source: XF
Type: UNKNOWN
policycoreutils-cve20181063-symlink(139845)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:selinux_project:selinux:-:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20181063
    V
    CVE-2018-1063
    2018-04-22
    oval:com.redhat.rhsa:def:20180913
    P
    RHSA-2018:0913: policycoreutils security, bug fix, and enhancement update (Low)
    2018-04-10
    oval:com.ubuntu.artful:def:20181063000
    V
    CVE-2018-1063 on Ubuntu 17.10 (artful) - untriaged.
    2018-03-02
    oval:com.ubuntu.trusty:def:20181063000
    V
    CVE-2018-1063 on Ubuntu 14.04 LTS (trusty) - untriaged.
    2018-03-02
    oval:com.ubuntu.xenial:def:20181063000
    V
    CVE-2018-1063 on Ubuntu 16.04 LTS (xenial) - untriaged.
    2018-03-02
    BACK
    redhat enterprise linux 7.0
    selinux_project selinux -