Vulnerability identifier: #VU42475
Vulnerability risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Glibc
Universal components / Libraries /
Libraries used by multiple products
Fedora
Operating systems & Components /
Operating system
Vendor:
GNU
Fedoraproject
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Glibc: 2.0 - 2.16
Fedora: 2.0 - 19
External links
https://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
https://secunia.com/advisories/55113
https://www.mandriva.com/security/advisories?name=MDVSA-2013:283
https://www.ubuntu.com/usn/USN-2985-1
https://www.ubuntu.com/usn/USN-2985-2
https://bugzilla.redhat.com/show_bug.cgi?id=976408
https://security.gentoo.org/glsa/201503-04
https://sourceware.org/bugzilla/show_bug.cgi?id=15755
https://sourceware.org/ml/libc-alpha/2013-08/msg00160.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.