In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
References
Link | Resource |
---|---|
https://www.ubuntu.com/usn/usn-3255-1/ | Third Party Advisory |
https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html | Third Party Advisory VDB Entry |
https://launchpad.net/bugs/1677924 | Third Party Advisory VDB Entry |
http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478 | VDB Entry Third Party Advisory |
http://www.securityfocus.com/bid/97486 | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/41923/ |
Information
Published : 2017-04-04 23:59
Updated : 2017-08-15 18:29
NVD link : CVE-2017-7358
Mitre link : CVE-2017-7358
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
canonical
- ubuntu_linux
lightdm_project
- lightdm