Vulnerability Name: | CVE-2017-5207 (CCN-123718) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-01-07 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-01-07 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | Firejail before 0.9.44.4, when running a bandwidth command, allows local users to gain root privileges via the --shell argument. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-5207 Source: CCN Type: oss-sec Mailing List, Sat, 7 Jan 2017 12:57:10 -0500 Re: Firejail local root exploit Source: MLIST Type: Mailing List, Patch, Third Party Advisory [oss-security] 20170107 Re: Firejail local root exploit Source: BID Type: Third Party Advisory, VDB Entry 97385 Source: CCN Type: BID-97385 Firejail CVE-2017-5207 Local Privilege Escalation Vulnerability Source: XF Type: UNKNOWN firejail-cve20175207-priv-esc(123718) Source: CCN Type: Firejail Web site Firejail | security sandbox Source: CONFIRM Type: Release Notes, Vendor Advisory https://firejail.wordpress.com/download-2/release-notes/ Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://github.com/netblue30/firejail/issues/1023 Source: GENTOO Type: Patch, Third Party Advisory, VDB Entry GLSA-201701-62 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |