7.2
CVSSv2

CVE-2016-10156

Published: 23/01/2017 Updated: 26/07/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local malicious users to escalate their privileges to root. This is fixed in v229.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systemd project systemd 228

Vendor Advisories

A flaw in systemd v228 in /src/basic/fs-utilc caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root This is fixed in v229 ...

Exploits

Source: wwwopenwallcom/lists/oss-security/2017/01/24/4 This is a heads up for a trivial systemd local root exploit, that was silently fixed in the upstream git as: commit 06eeacb6fe029804f296b065b3ce91e796e1cd0e Author: Date: Fri Jan 29 23:36:08 2016 +0200 basic: fix touch() creating files with 07777 mode mode_t is u ...
Systemd 228 privilege escalation proof of concept exploit ...

Recent Articles

Penguins force-fed root: Cruel security flaw found in systemd v228
The Register • John Leyden • 24 Jan 2017

Opens door to privilege escalation attacks

Some Linux distros will need to be updated following the discovery of an easily exploitable flaw in a core system management component. The CVE-2016-10156 security hole in systemd v228 opens the door to privilege escalation attacks, creating a means for hackers to root systems locally if not across the internet. The vulnerability is fixed in systemd v229. Essentially, it is possible to create world-readable, world-writeable setuid executable files that are root owned by setting all the mode bits...