- Description
- artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 6
- Impact score
- 10
- Exploitability score
- 1.5
- Vector string
- AV:L/AC:H/Au:S/C:C/I:C/A:C
- nvd@nist.gov
- CWE-273
- Hype score
- Not currently trending
- Comment
- -
- Impact
- -
- Solution
- -
- Red HatNot vulnerable. We do not ship aRts as setuid root on Red Hat Enterprise Linux 2.1, 3, or 4.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kde:arts:1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ECA4B1F0-C924-4308-862F-0FE65D7BAB4D"
},
{
"criteria": "cpe:2.3:a:kde:arts:1.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EC2D979D-0731-4CE3-9D16-22EF314884A2"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DC4FB0A3-C8CC-4AB5-8A9D-EF370368B1EB",
"versionStartIncluding": "2.6.0"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]