CVE-2016-2853

high

Description

The aufs module for the Linux kernel 3.x and 4.x does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an aufs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.

References

http://www.halfdog.net/Security/2016/AufsPrivilegeEscalationInUserNamespaces/

http://www.openwall.com/lists/oss-security/2016/02/24/9

https://sourceforge.net/p/aufs/mailman/message/34864744/

http://www.securityfocus.com/bid/96839

http://www.openwall.com/lists/oss-security/2021/10/18/1

Details

Source: MITRE

Published: 2016-05-02

Updated: 2022-04-18

Type: CWE-269

Risk Information

CVSS v2

Base Score: 4.4

Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH