Vulnerability Name: | CVE-2018-1171 (CCN-140000) | ||||||||||||
Assigned: | 2017-12-05 | ||||||||||||
Published: | 2018-03-07 | ||||||||||||
Updated: | 2020-08-28 | ||||||||||||
Summary: | This vulnerability allows local attackers to escalate privileges on vulnerable installations of Joyent SmartOS release-20170803-20170803T064301Z. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DTrace DOF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code under the context of the host OS. Was ZDI-CAN-5106. | ||||||||||||
CVSS v3 Severity: | 7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-1171 Source: CCN Type: Oracle CPUJul2018 Oracle Critical Patch Update Advisory - July 2018 Source: CONFIRM Type: Patch, Third Party Advisory http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html Source: BID Type: Third Party Advisory, VDB Entry 104799 Source: CCN Type: BID-104799 Oracle Solaris Multiple Local Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1041303 Source: XF Type: UNKNOWN joyent-cve20181171-priv-esc(140000) Source: CCN Type: Joyent Security Advisory ZDI-CAN-5106 Source: CONFIRM Type: Vendor Advisory https://help.joyent.com/hc/en-us/articles/360000608188 Source: CCN Type: ZDI-18-236 Joyent SmartOS DTrace DOF Out-Of-Bounds Write Privilege Escalation Vulnerability Source: MISC Type: Third Party Advisory, VDB Entry https://zerodayinitiative.com/advisories/ZDI-18-236 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||
BACK |