Vulnerability Name: | CVE-2014-7272 (CCN-96834) | ||||||||||||||||||||
Assigned: | 2014-10-01 | ||||||||||||||||||||
Published: | 2014-10-01 | ||||||||||||||||||||
Updated: | 2018-03-27 | ||||||||||||||||||||
Summary: | Simple Desktop Display Manager (SDDM) before 0.10.0 allows local users to gain root privileges because code running as root performs write operations within a user home directory, and this user may have created links in advance (exploitation requires the user to win a race condition in the ~/.Xauthority chown case, but not other cases). | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.8 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
5.8 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
| ||||||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-7272 Source: FEDORA Type: Third Party Advisory FEDORA-2014-12308 Source: FEDORA Type: Third Party Advisory FEDORA-2014-12442 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20141006 Re: various sddm vulnerabilities Source: CCN Type: BID-70202 SDDM CVE-2014-7272 Multiple Security Vulnerabilities Source: CONFIRM Type: Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1149610 Source: CCN Type: Bugzilla Bug 897788 (CVE-2014-7272) VUL-1: CVE-2014-7272: sddm: various local privilege issues Source: XF Type: UNKNOWN sddm-cve20147272-priv-esc(96834) Source: CCN Type: SDDM GIT Repository SDDM Source: CONFIRM Type: Patch https://github.com/sddm/sddm/pull/280 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |