9
CVE-2019-11328
- EPSS 0.84%
- Published 14.05.2019 21:29:01
- Last modified 21.11.2024 04:20:53
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
Data is provided by the National Vulnerability Database (NVD)
Sylabs ≫ Singularity Version >= 3.1.0 < 3.2.0
Sylabs ≫ Singularity Version3.2.0 Update-
Sylabs ≫ Singularity Version3.2.0 Updaterc1
Sylabs ≫ Singularity Version3.2.0 Updaterc2
Fedoraproject ≫ Fedora Version28
Fedoraproject ≫ Fedora Version29
Fedoraproject ≫ Fedora Version30
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.84% | 0.738 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 9 | 8 | 10 |
AV:N/AC:L/Au:S/C:C/I:C/A:C
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.