Published: 28/09/2017 Updated: 11/10/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The daily mandb cleanup job in Man-db prior to as packaged in Ubuntu and Debian allows local users with access to the man account to gain privileges via vectors involving insecure chown use.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

man-db_project man-db

Vendor Advisories

Debian Bug report logs - #840357 CVE-2015-1336 Package: man-db; Maintainer for man-db is Colin Watson <cjwatson@debianorg>; Source for man-db is src:man-db (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 10 Oct 2016 21:33:02 UTC Severity: important Tags: security Found in version ...


/* EDB Note: man:man -> man:root ~ wwwhalfdognet/Security/2015/SetgidDirectoryPrivilegeEscalation/ man:root -> root:root ~ wwwhalfdognet/Security/2015/MandbSymlinkLocalRootPrivilegeEscalation/ CreateSetgidBinaryc ~ wwwhalfdognet/Security/2015/SetgidDirectoryPrivilegeEscalation/CreateSetgidBinaryc DirModifyInotif ...