← Back to CVEs
CVE-2018-1171
HIGH7.0
Description
This vulnerability allows local attackers to escalate privileges on vulnerable installations of Joyent SmartOS release-20170803-20170803T064301Z. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DTrace DOF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code under the context of the host OS. Was ZDI-CAN-5106.
CVE Details
CVSS v3.1 Score7.0
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published3/19/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
joyent:smartosoracle:solaris
Weaknesses (CWE)
CWE-787CWE-787
References
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html(zdi-disclosures@trendmicro.com)
http://www.securityfocus.com/bid/104799(zdi-disclosures@trendmicro.com)
http://www.securitytracker.com/id/1041303(zdi-disclosures@trendmicro.com)
https://help.joyent.com/hc/en-us/articles/360000608188(zdi-disclosures@trendmicro.com)
https://zerodayinitiative.com/advisories/ZDI-18-236(zdi-disclosures@trendmicro.com)
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104799(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1041303(af854a3a-2127-422b-91ae-364da2661108)
https://help.joyent.com/hc/en-us/articles/360000608188(af854a3a-2127-422b-91ae-364da2661108)
https://zerodayinitiative.com/advisories/ZDI-18-236(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.