CVE-2016-2568

Published on: 02/13/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Certain versions of Polkit from Freedesktop contain the following vulnerability:

pkexec, when used with --user nonpriv, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

  • CVE-2016-2568 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL HIGH LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
CHANGED HIGH HIGH HIGH

CVSS2 Score: 4.4 - MEDIUM

Access
Vector
Access
Complexity
Authentication
LOCAL MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
1300746 – (CVE-2016-2568) CVE-2016-2568 polkit: Program run via pkexec as unprivileged user can escape to parent session via TIOCSTI ioctl Issue Tracking
bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1300746
oss-security - Re: CVE Request: pkexec tty hijacking via TIOCSTI ioctl Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160226 Re: CVE Request: pkexec tty hijacking via TIOCSTI ioctl

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationFreedesktopPolkitAllAllAllAll
ApplicationFreedesktopPolkitAllAllAllAll
  • cpe:2.3:a:freedesktop:polkit:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:freedesktop:polkit:*:*:*:*:*:*:*:*: