CVE-2016-6253

Published on: 01/20/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:11 PM UTC

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Certain versions of Netbsd from Netbsd contain the following vulnerability:

mail.local in NetBSD versions 6.0 through 6.0.6, 6.1 through 6.1.5, and 7.0 allows local users to change ownership of or append data to arbitrary files on the target system via a symlink attack on the user mailbox.

  • CVE-2016-6253 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
LOCAL LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.2 - HIGH

Access
Vector
Access
Complexity
Authentication
LOCAL LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
NetBSD mail.local(8) Local Root ≈ Packet Storm Exploit
Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/138021/NetBSD-mail.local-8-Local-Root.html
NetBSD mail.local(8) - Privilege Escalation (NetBSD-SA2016-006) Exploit
Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40141
CVE-2016-6253 NetBSD mail.local Privilege Escalation | Rapid7 Exploit
Third Party Advisory
VDB Entry
www.rapid7.com
text/html
URL Logo MISC www.rapid7.com/db/modules/exploit/unix/local/netbsd_mail_local
NetBSD mail.local(8) Race Condition Lets Local Users Obtain Root Privileges - SecurityTracker Third Party Advisory
VDB Entry
www.securitytracker.com
text/html
URL Logo SECTRACK 1036429
akat1 - Spawn your shell like it's 90s again! Exploit
Third Party Advisory
akat1.pl
text/x-c
MISC akat1.pl/?id=2
Vendor Advisory
ftp.netbsd.org
text/plain
NETBSD NetBSD-SA2016-006
NetBSD mail.local(8) - Privilege Escalation (Metasploit) Exploit
Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40385
NetBSD CVE-2016-6253 Local Privilege Escalation Vulnerability Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 92101

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Operating
System
NetbsdNetbsd6.0AllAllAll
Operating
System
NetbsdNetbsd6.0.1AllAllAll
Operating
System
NetbsdNetbsd6.0.2AllAllAll
Operating
System
NetbsdNetbsd6.0.3AllAllAll
Operating
System
NetbsdNetbsd6.0.4AllAllAll
Operating
System
NetbsdNetbsd6.0.5AllAllAll
Operating
System
NetbsdNetbsd6.0.6AllAllAll
Operating
System
NetbsdNetbsd6.1AllAllAll
Operating
System
NetbsdNetbsd6.1.1AllAllAll
Operating
System
NetbsdNetbsd6.1.2AllAllAll
Operating
System
NetbsdNetbsd6.1.3AllAllAll
Operating
System
NetbsdNetbsd6.1.4AllAllAll
Operating
System
NetbsdNetbsd6.1.5AllAllAll
Operating
System
NetbsdNetbsd7.0AllAllAll
Operating
System
NetbsdNetbsd6.0AllAllAll
Operating
System
NetbsdNetbsd6.0.1AllAllAll
Operating
System
NetbsdNetbsd6.0.2AllAllAll
Operating
System
NetbsdNetbsd6.0.3AllAllAll
Operating
System
NetbsdNetbsd6.0.4AllAllAll
Operating
System
NetbsdNetbsd6.0.5AllAllAll
Operating
System
NetbsdNetbsd6.0.6AllAllAll
Operating
System
NetbsdNetbsd6.1AllAllAll
Operating
System
NetbsdNetbsd6.1.1AllAllAll
Operating
System
NetbsdNetbsd6.1.2AllAllAll
Operating
System
NetbsdNetbsd6.1.3AllAllAll
Operating
System
NetbsdNetbsd6.1.4AllAllAll
Operating
System
NetbsdNetbsd6.1.5AllAllAll
Operating
System
NetbsdNetbsd7.0AllAllAll
  • cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:7.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*:
  • cpe:2.3:o:netbsd:netbsd:7.0:*:*:*:*:*:*:*: