Incorrect permission assignment for critical resource in Debian Linux - CVE-2017-9780

 

Incorrect permission assignment for critical resource in Debian Linux - CVE-2017-9780

Published: June 21, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU38827
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-9780
CWE-ID: CWE-732
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Debian
Affected software:
Debian Linux

Detailed vulnerability description

The vulnerability allows a local authenticated user to execute arbitrary code.

In Flatpak before 0.8.7, a third-party app repository could include malicious apps that contain files with inappropriate permissions, for example setuid or world-writable. The files are deployed with those permissions, which would let a local attacker run the setuid executable or write to the world-writable location. In the case of the "system helper" component, files deployed as part of the app are owned by root, so in the worst case they could be setuid root.


How to mitigate CVE-2017-9780

Install update from vendor's website.

Sources