5.5
CVSSv3

CVE-2020-16127

Published: 11/11/2020 Updated: 24/11/2020
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An Ubuntu-specific modification to AccountsService in versions prior to 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

freedesktop accountsservice

Github Repositories

A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。

Ubuntu-Gnome-privilege-escalation A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation 一个可以方便实现Ubuntu本地提权的bash脚本(利用CVE-2020-16126/CVE-2020-16127漏洞),要求处于Gnome环境。 Affect version Ubuntu 20041\2010\1804\1604 LTS and so on Usage curl rawgithubusercontentcom/zev3n/Ubuntu-Gnom