4.6
CVSSv2

CVE-2017-18078

Published: 29/01/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 465
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

systemd-tmpfiles in systemd prior to 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

systemd project systemd

debian debian linux 8.0

opensuse leap 42.3

Vendor Advisories

systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fsprotected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the owners ...
systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fsprotected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the owners ...

Exploits

Product: systemd (systemd-tmpfiles) Versions-affected: 236 and earlier Author: Michael Orlitzky Fixed-in: commit 5579f85 , version 237 Bug-report: githubcom/systemd/systemd/issues/7736 Acknowledgments: Lennart Poettering who, instead of calling me an idiot for not realizing that systemd enables fsprotected_hardlinks by default, went o ...

Github Repositories

Ultimate Benchmark for Container Image Scanners

UBCIS Ultimate Benchmark for Container Image Scanning (UBCIS) is a benchmark for detecting the scanner performance in terms of precision and vulnerability coverage on most common Linux Docker basic images UBCIS can evaluate your scanner and score it using statistical notations of precision, recall and f-measure UBCIS can also run a set of scanners on a set of container images