Vulnerability Name:

CVE-2018-1171 (CCN-140000)

Assigned:2017-12-05
Published:2018-03-07
Updated:2020-08-28
Summary:This vulnerability allows local attackers to escalate privileges on vulnerable installations of Joyent SmartOS release-20170803-20170803T064301Z. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DTrace DOF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code under the context of the host OS. Was ZDI-CAN-5106.
CVSS v3 Severity:7.0 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.9 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Privileges
References:Source: MITRE
Type: CNA
CVE-2018-1171

Source: CCN
Type: Oracle CPUJul2018
Oracle Critical Patch Update Advisory - July 2018

Source: CONFIRM
Type: Patch, Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html

Source: BID
Type: Third Party Advisory, VDB Entry
104799

Source: CCN
Type: BID-104799
Oracle Solaris Multiple Local Security Vulnerabilities

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1041303

Source: XF
Type: UNKNOWN
joyent-cve20181171-priv-esc(140000)

Source: CCN
Type: Joyent Security Advisory
ZDI-CAN-5106

Source: CONFIRM
Type: Vendor Advisory
https://help.joyent.com/hc/en-us/articles/360000608188

Source: CCN
Type: ZDI-18-236
Joyent SmartOS DTrace DOF Out-Of-Bounds Write Privilege Escalation Vulnerability

Source: MISC
Type: Third Party Advisory, VDB Entry
https://zerodayinitiative.com/advisories/ZDI-18-236

Vulnerable Configuration:Configuration 1:
  • cpe:/o:joyent:smartos:20170803-20170803t064301z:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:oracle:solaris:10:*:*:*:*:*:*:*
  • OR cpe:/o:oracle:solaris:11.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:joyent:smartos:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:oracle:solaris:10:*:*:*:*:*:*:*
  • OR cpe:/o:oracle:solaris:11.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    joyent smartos 20170803-20170803t064301z
    oracle solaris 10
    oracle solaris 11.3
    joyent smartos *
    oracle solaris 10
    oracle solaris 11.3