3.3
CVSSv3

CVE-2020-16126

Published: 11/11/2020 Updated: 24/11/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 3.3 | Impact Score: 1.4 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An Ubuntu-specific modification to AccountsService in versions prior to 0.6.55-0ubuntu13.2, among other earlier versions, improperly dropped the ruid, allowing untrusted users to send signals to AccountService, thus stopping it from handling D-Bus messages in a timely fashion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freedesktop accountsservice

Github Repositories

A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。

Ubuntu-Gnome-privilege-escalation A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation 一个可以方便实现Ubuntu本地提权的bash脚本(利用CVE-2020-16126/CVE-2020-16127漏洞),要求处于Gnome环境。 Affect version Ubuntu 20041\2010\1804\1604 LTS and so on Usage curl rawgithubusercontentcom/zev3n/Ubuntu-Gnom