It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox.
Find out more about CVE-2016-7545 from the MITRE CVE dictionary dictionary and NIST NVD.
Base Score | 6.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
CVSS3 Base Score | 8.6 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | None |
User Interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity Impact | High |
Availability Impact | High |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux Extended Update Support 7.2 (policycoreutils) | RHSA-2017:0535 | 2017-03-15 |
Red Hat Enterprise Linux Extended Update Support 7.1 (policycoreutils) | RHSA-2017:0536 | 2017-03-15 |
Red Hat Enterprise Linux 6 (policycoreutils) | RHSA-2016:2702 | 2016-11-14 |
Red Hat Enterprise Linux 7 (policycoreutils) | RHSA-2016:2702 | 2016-11-14 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | policycoreutils | Not affected |