Executive Summary

Summary
Title Eject vulnerability
Informations
Name USN-3246-1 First vendor Publication 2017-03-27
Vendor Ubuntu Last vendor Modification 2017-03-27
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS

Summary:

Eject could be made to run programs as an administrator.

Software Description: - eject: ejects CDs and operates CD-Changers under Linux

Details:

Ilja Van Sprundel discovered that dmcrypt-get-device incorrectly checked setuid and setgid return values. A local attacker could use this issue to execute code as an administrator.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.10:
eject 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1

Ubuntu 16.04 LTS:
eject 2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1

Ubuntu 14.04 LTS:
eject 2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1

Ubuntu 12.04 LTS:
eject 2.1.5+deb1+cvs20081104-9ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3246-1
CVE-2017-6964

Package Information:
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-13.1ubuntu0.16.10.1
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-13.1ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-13.1ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/eject/2.1.5+deb1+cvs20081104-9ubuntu0.1

Original Source

Url : http://www.ubuntu.com/usn/USN-3246-1

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-252 Unchecked Return Value

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 4
Os 1

Nessus® Vulnerability Scanner

Date Description
2017-03-30 Name : The remote Debian host is missing a security update.
File : debian_DLA-876.nasl - Type : ACT_GATHER_INFO
2017-03-30 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3823.nasl - Type : ACT_GATHER_INFO
2017-03-28 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-3246-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2017-04-08 00:22:15
  • Multiple Updates
2017-04-05 00:23:22
  • Multiple Updates
2017-03-29 13:24:22
  • Multiple Updates
2017-03-28 09:21:30
  • Multiple Updates
2017-03-28 00:23:17
  • First insertion