Vulnerability identifier: #VU42475
Vulnerability risk: Low
CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Glibc
Universal components / Libraries /
Libraries used by multiple products
Fedora
Operating systems & Components /
Operating system
Vendor:
GNU
Fedoraproject
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Glibc: 2.0 - 2.16
Fedora: 2.0 - 19
External links
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
http://secunia.com/advisories/55113
http://www.mandriva.com/security/advisories?name=MDVSA-2013:283
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
http://bugzilla.redhat.com/show_bug.cgi?id=976408
http://security.gentoo.org/glsa/201503-04
http://sourceware.org/bugzilla/show_bug.cgi?id=15755
http://sourceware.org/ml/libc-alpha/2013-08/msg00160.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.