Common Vulnerabilities and Exposures (CVE)

Public dictionary of known cybersecurity flaws, providing unique identifiers (CVE IDs), descriptions, and references for security vulnerabilities in software and hardware.

CVE-2015-1328

Assigned by [email protected]

The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.


Weaknesses (CWE)

CWE-264 — Permissions, Privileges, and Access Controls

CVSS

7.8

Base Score: 7.8/10 HIGH

Exploitability: 1.8/10

Impact: 5.9/10

Access Vector

  • Availability: HIGH
  • Confidentiality: HIGH
  • Integrity: HIGH

Impact

  • Authentication: NONE
  • Complexity: LOW
  • Vector: LOCAL

Attack Patterns (CAPEC)

References

http://seclists.org/oss-sec/2015/q2/717
http://www.exploit-db.com/exploits/40688/
http://www.securityfocus.com/bid/75206
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html
https://security-tracker.debian.org/tracker/CVE-2015-1328
https://www.exploit-db.com/exploits/37292/
http://seclists.org/oss-sec/2015/q2/717
http://www.exploit-db.com/exploits/40688/
http://www.securityfocus.com/bid/75206
https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-1328.html
https://security-tracker.debian.org/tracker/CVE-2015-1328
https://www.exploit-db.com/exploits/37292/