CVE-2016-1883

Published on: 02/15/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:04 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Freebsd from Freebsd contain the following vulnerability:

The issetugid system call in the Linux compatibility layer in FreeBSD 9.3, 10.1, and 10.2 allows local users to gain privilege via unspecified vectors.

  • CVE-2016-1883 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.2 - HIGH

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Vendor Advisory
www.freebsd.org
text/plain
URL Logo FREEBSD FreeBSD-SA-16:10
FreeBSD Linux Support issetugid(2) Error Lets Local Users Gain Elevated Privileges - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1034872

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
FreebsdFreebsd10.1AllAllAll
Operating
System
FreebsdFreebsd10.2AllAllAll
Operating
System
FreebsdFreebsd9.3AllAllAll
Operating
System
FreebsdFreebsd10.1AllAllAll
Operating
System
FreebsdFreebsd10.2AllAllAll
Operating
System
FreebsdFreebsd9.3AllAllAll
  • cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:10.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:10.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:10.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:freebsd:freebsd:9.3:*:*:*:*:*:*:*: