7.2
CVSSv2

CVE-2018-7738

Published: 07/03/2018 Updated: 25/09/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 643
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In util-linux prior to 2.32-rc1, bash-completion/umount allows local users to gain privileges by embedding shell commands in a mountpoint name, which is mishandled during a umount command (within Bash) by a different user, as demonstrated by logging in as root and entering umount followed by a tab character for autocompletion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kernel util-linux

Vendor Advisories

Debian Bug report logs - #892179 util-linux: CVE-2018-7738: code execution in bash-completion for umount Package: src:util-linux; Maintainer for src:util-linux is LaMont Jones <lamont@debianorg>; Reported by: Björn Bosselmann <BjoernBosselmann@gdatade> Date: Tue, 6 Mar 2018 13:54:01 UTC Severity: grave Tags: fix ...
A command injection flaw was found in the way util-linux implements umount autocompletion in Bash An attacker with the ability to mount a filesystem with custom mount points may execute arbitrary commands on behalf of the user who triggers the umount autocompletion (CVE-2018-7738) ...
A command injection flaw was found in the way util-linux implements umount autocompletion in Bash An attacker with the ability to mount a filesystem with custom mount points may execute arbitrary commands on behalf of the user who triggers the umount autocompletion ...