#VU9992 Privilege escalation in Linux kernel - CVE-2018-1000001

 

#VU9992 Privilege escalation in Linux kernel - CVE-2018-1000001

Published: January 12, 2018 / Updated: June 17, 2021


Vulnerability identifier: #VU9992
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear
CVE-ID: CVE-2018-1000001
CWE-ID: CWE-124
Exploitation vector: Local access
Exploit availability: Public exploit is available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in due to a change in the processing of pathnames in the getcwd() command introduced in Linux kernel. A local attacker can use a specially crafted application, trigger buffer underflow in the __realpath() function in 'stdlib/canonicalize.c' and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.

External links