CVE-2018-1171
Summary
| CVE | CVE-2018-1171 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-19 18:29:00 UTC |
| Updated | 2020-08-28 15:18:00 UTC |
| Description | This vulnerability allows local attackers to escalate privileges on vulnerable installations of Joyent SmartOS release-20170803-20170803T064301Z. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DTrace DOF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code under the context of the host OS. Was ZDI-CAN-5106. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Joyent | Smartos | 20170803-20170803t064301z | All | All | All |
| Operating System | Joyent | Smartos | 20170803-20170803t064301z | All | All | All |
| Operating System | Oracle | Solaris | 10 | All | All | All |
| Operating System | Oracle | Solaris | 11.3 | All | All | All |
| Operating System | Oracle | Solaris | 10 | All | All | All |
| Operating System | Oracle | Solaris | 11.3 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Malformed Request | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CPU July 2018 | CONFIRM | www.oracle.com | Patch, Third Party Advisory |
| Joyent Ticketing System | CONFIRM | help.joyent.com | Vendor Advisory |
| ZDI-18-236 | Zero Day Initiative | MISC | zerodayinitiative.com | Third Party Advisory, VDB Entry |
| Solaris Multiple Flaws Let Remote and Local Users Gain Elevated Privileges, Access and Modify Data, and Deny Service - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.