NA

CVE-2021-3864

Published: 26/08/2022 Updated: 12/02/2023
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 0

Vulnerability Summary

A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel -

debian debian linux 10.0

debian debian linux 11.0

redhat enterprise linux 7.0

redhat enterprise linux 6.0

redhat enterprise linux 9.0

Github Repositories

Test for cve-2021-3864

Test for CVE-2021-3864 How to run create a user echo <username> ALL= path/to/gen-core >> /etc/sudoers sysctl kernelcore_pattern=core /cve-2021-3864 It should generate a core file in /etc/logrotated

A simple, lightweight vulnerability scanner that reports if CVEs are present in the CISA KEV database.

exploitlens A simple, lightweight vulnerability scanner that reports if CVEs are present in the CISA KEV database Checking for the presense of CVEs in the CISA KEV database is useful for choosing which vulnerabilities to prioritize for remediation Uses Grype to perform the scan Usage Build from source make build Scan a container image