CVE-2021-3864
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A flaw was found in the way the dumpable flag setting was handled when certain SUID binaries executed its descendants. The prerequisite is a SUID binary that sets real UID equal to effective UID, and real GID equal to effective GID. The descendant will then have a dumpable value set to 1. As a result, if the descendant process crashes and core_pattern is set to a relative value, its core dump is stored in the current directory with uid:gid permissions. An unprivileged local user with eligible root SUID binary could use this flaw to place core dumps into root-owned directories, potentially resulting in escalation of privileges.
Se ha encontrado un fallo en la forma en que es manejada la configuración del flag volcable cuando determinados binarios SUID ejecutan sus descendientes. El prerrequisito es un binario SUID que establece el UID real igual al UID efectivo, y el GID real igual al GID efectivo. El descendiente tendrá entonces un valor descargable establecido en 1. Como resultado, si el proceso descendiente es bloqueado y core_pattern es establecido en un valor relativo, su volcado de núcleo es almacenado en el directorio actual con permisos uid:gid. Un usuario local no privilegiado con el binario SUID de root podría usar este fallo para colocar los volcados de núcleo en directorios propiedad de root, lo que podría resultar en una escalada de privilegios.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-10-06 CVE Reserved
- 2022-08-26 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-284: Improper Access Control
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://access.redhat.com/security/cve/CVE-2021-3864 | Third Party Advisory | |
https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com | X_refsource_misc | |
https://lore.kernel.org/all/20211226150310.GA992%401wt.eu | X_refsource_misc | |
https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com | X_refsource_misc | |
https://security-tracker.debian.org/tracker/CVE-2021-3864 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.openwall.com/lists/oss-security/2021/10/20/2 | 2024-08-03 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2015046 | 2023-02-12 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | - | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 11.0 Search vendor "Debian" for product "Debian Linux" and version "11.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 6.0 Search vendor "Redhat" for product "Enterprise Linux" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 7.0 Search vendor "Redhat" for product "Enterprise Linux" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 9.0 Search vendor "Redhat" for product "Enterprise Linux" and version "9.0" | - |
Affected
|