4.6
CVSSv2

CVE-2016-1572

Published: 22/01/2016 Updated: 23/03/2022
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.4 | Impact Score: 5.9 | Exploitability Score: 2.5
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

ecryptfs ecryptfs-utils

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 15.04

canonical ubuntu linux 15.10

opensuse leap 42.1

opensuse opensuse 13.1

opensuse opensuse 13.2

debian debian linux 7.0

debian debian linux 8.0

fedoraproject fedora 22

fedoraproject fedora 23

Vendor Advisories

mountecryptfs_private could be used to run programs as an administrator ...
Jann Horn discovered that the setuid-root mountecryptfs_private helper in the ecryptfs-utils would mount over any target directory that the user owns, including a directory in procfs A local attacker could use this flaw to escalate his privileges For the oldstable distribution (wheezy), this problem has been fixed in version 99-1+deb7u1 For the ...
mountecryptfs_privatec in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid ...