CVE-2015-1328
Assigned by [email protected]
The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.
Weaknesses (CWE)
CWE-264 — Permissions, Privileges, and Access Controls
CVSS
7.8
Base Score: 7.8/10 HIGH
Exploitability: 1.8/10
Impact: 5.9/10
Access Vector
- Availability: HIGH
- Confidentiality: HIGH
- Integrity: HIGH
Impact
- Authentication: NONE
- Complexity: LOW
- Vector: LOCAL
Attack Patterns (CAPEC)
References
http://seclists.org/oss-sec/2015/q2/717
http://www.exploit-db.com/exploits/40688/
http://www.securityfocus.com/bid/75206
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html
https://security-tracker.debian.org/tracker/CVE-2015-1328
https://www.exploit-db.com/exploits/37292/
http://seclists.org/oss-sec/2015/q2/717
http://www.exploit-db.com/exploits/40688/
http://www.securityfocus.com/bid/75206
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html
https://security-tracker.debian.org/tracker/CVE-2015-1328
https://www.exploit-db.com/exploits/37292/
