Vulnerability Name: | CVE-2016-0727 (CCN-110181) | ||||||||||||||||||||
Assigned: | 2015-12-16 | ||||||||||||||||||||
Published: | 2016-01-26 | ||||||||||||||||||||
Updated: | 2017-04-20 | ||||||||||||||||||||
Summary: | The crontab script in the ntp package before 1:4.2.6.p3+dfsg-1ubuntu3.11 on Ubuntu 12.04 LTS, before 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 on Ubuntu 14.04 LTS, on Ubuntu Wily, and before 1:4.2.8p4+dfsg-3ubuntu5.3 on Ubuntu 16.04 LTS allows local users with access to the ntp account to write to arbitrary files and consequently gain privileges via vectors involving statistics directory cleanup. | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.9 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
7.4 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-0727 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html Source: CCN Type: Halfdog Web site NtpCronjobUserNtpToRootPrivilegeEscalation Source: CCN Type: NTP Web site NTP Source: BID Type: Third Party Advisory, VDB Entry 81552 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1034808 Source: UBUNTU Type: Vendor Advisory USN-3096-1 Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1528050 Source: CONFIRM Type: Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1382369 Source: XF Type: UNKNOWN ntp-cve20160727-priv-esc(110181) | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |