Executive Summary

Summary
Title libuv: Privilege escalation
Informations
Name GLSA-201611-10 First vendor Publication 2016-11-17
Vendor Gentoo Last vendor Modification 2016-11-17
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A vulnerability in libuv could lead to privilege escalation.

Background

libuv is a multi-platform support library with a focus on asynchronous I/O.

Description

It was discovered that libuv does not call setgroups before calling setuid/setgid. If this is not called, then even though the uid has been dropped, there may still be groups associated that permit superuser privileges.

Impact

Context-dependent attackers could escalate privileges via unspecified vectors.

Workaround

There is no known workaround at this time.

Resolution

All libuv users should upgrade to the latest version:
# emerge --sync
# emerge --ask --verbose --oneshot ">=dev-libs/libuv-1.4.2"

References

[ 1 ] CVE-2015-0278
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0278

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201611-10

Original Source

Url : http://security.gentoo.org/glsa/glsa-201611-10.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-273 Improper Check for Dropped Privileges

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 42
Os 1

Nessus® Vulnerability Scanner

Date Description
2016-11-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201611-10.nasl - Type : ACT_GATHER_INFO
2015-05-07 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2015-228.nasl - Type : ACT_GATHER_INFO
2015-03-25 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_996bce94d23d11e494639cb654ea3e1c.nasl - Type : ACT_GATHER_INFO
2015-03-17 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-2310.nasl - Type : ACT_GATHER_INFO
2015-03-17 Name : The remote Fedora host is missing a security update.
File : fedora_2015-2563.nasl - Type : ACT_GATHER_INFO
2015-03-02 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2015-2313.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2016-11-18 13:25:41
  • Multiple Updates
2016-11-17 13:23:48
  • First insertion