Vulnerability Name:

CVE-2007-3912 (CCN-36475)

Assigned:2007-09-01
Published:2007-09-01
Updated:2017-07-29
Summary:checkrestart in debian-goodies before 0.34 allows local users to gain privileges via shell metacharacters in the name of the executable file for a running process.
CVSS v3 Severity:8.1 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.2 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C)
4.6 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
CWE-20
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Debian Bug report logs - #440411
checkrestart: arbitrary root-privileged command execution

Source: CONFIRM
Type: Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=440411

Source: MITRE
Type: CNA
CVE-2007-3912

Source: OSVDB
Type: UNKNOWN
40483

Source: CCN
Type: Debian Web site
debian-goodies package

Source: CCN
Type: SA26675
Debian debian-goodies Command Execution Vulnerability

Source: SECUNIA
Type: Vendor Advisory
26675

Source: SECUNIA
Type: UNKNOWN
27079

Source: DEBIAN
Type: UNKNOWN
DSA-1527

Source: DEBIAN
Type: DSA-1527
debian-goodies -- insufficient input sanitising

Source: CCN
Type: OSVDB ID: 40483
Debian Linux debian-goodies checkrestart Local Arbitrary Command Execution

Source: BID
Type: UNKNOWN
25569

Source: CCN
Type: BID-25569
debian-goodies Checkrestart Script Local Privilege Escalation Vulnerability

Source: CCN
Type: USN-526-1
debian-goodies vulnerability

Source: UBUNTU
Type: UNKNOWN
USN-526-1

Source: XF
Type: UNKNOWN
debian-checkrestart-privilege-escalation(36475)

Source: XF
Type: UNKNOWN
debian-checkrestart-privilege-escalation(36475)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:debian:debian-goodies:0.27:*:*:*:*:*:*:*
  • OR cpe:/a:debian:debian-goodies:0.33:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:debian:debian-goodies:0.27:*:*:*:*:*:*:*
  • OR cpe:/a:debian:debian-goodies:0.33:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:17423
    P
    USN-526-1 -- debian-goodies vulnerability
    2014-06-30
    oval:org.mitre.oval:def:8247
    P
    DSA-1527 debian-goodies -- insufficient input sanitising
    2014-06-23
    oval:org.mitre.oval:def:18559
    P
    DSA-1527-1 debian-goodies - privilege escalation
    2014-06-23
    oval:org.debian:def:1527
    V
    insufficient input sanitising
    2008-03-24
    BACK
    debian debian-goodies 0.27
    debian debian-goodies 0.33
    debian debian-goodies 0.27
    debian debian-goodies 0.33
    debian debian linux 3.1
    canonical ubuntu 6.06
    debian debian linux 4.0
    canonical ubuntu 7.04