CVE-2016-2779

Published on: 02/07/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Util-linux from Kernel contain the following vulnerability:

runuser in util-linux allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.

  • CVE-2016-2779 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.2 - HIGH

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
#815922 - util-linux: CVE-2016-2779: runuser tty hijacking via TIOCSTI ioctl - Debian Bug report logs Issue Tracking
Third Party Advisory
bugs.debian.org
text/x-c
URL Logo MISC bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922
oss-security - CVE Request: util-linux runuser tty hijacking via TIOCSTI ioctl Mailing List
Third Party Advisory
www.openwall.com
text/x-c
URL Logo MLIST [oss-security] 20160226 CVE Request: util-linux runuser tty hijacking via TIOCSTI ioctl
oss-security - Re: CVE Request: util-linux runuser tty hijacking via TIOCSTI ioctl Mailing List
Third Party Advisory
www.openwall.com
text/html
URL Logo MLIST [oss-security] 20160227 Re: CVE Request: util-linux runuser tty hijacking via TIOCSTI ioctl

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationKernelUtil-linux2.24.2-1AllAllAll
ApplicationKernelUtil-linux2.24.2-1AllAllAll
  • cpe:2.3:a:kernel:util-linux:2.24.2-1:*:*:*:*:*:*:*:
  • cpe:2.3:a:kernel:util-linux:2.24.2-1:*:*:*:*:*:*:*: