9
CVE-2019-11328
- EPSS 0.84%
- Veröffentlicht 14.05.2019 21:29:01
- Zuletzt bearbeitet 21.11.2024 04:20:53
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sylabs ≫ Singularity Version >= 3.1.0 < 3.2.0
Sylabs ≫ Singularity Version3.2.0 Update-
Sylabs ≫ Singularity Version3.2.0 Updaterc1
Sylabs ≫ Singularity Version3.2.0 Updaterc2
Fedoraproject ≫ Fedora Version28
Fedoraproject ≫ Fedora Version29
Fedoraproject ≫ Fedora Version30
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.84% | 0.74 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 9 | 8 | 10 |
AV:N/AC:L/Au:S/C:C/I:C/A:C
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.