CVE-2016-1247
moderate-risk
Published 2016-11-29
The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages before 1.4.6-1ubuntu3.6 on Ubuntu 14.04 LTS, before 1.10.0-0ubuntu0.16.04.3 on Ubuntu 16.04 LTS, and before 1.10.1-0ubuntu1.1 on Ubuntu 16.10, and the nginx ebuild before 1.10.2-r3 on Gentoo allow local users with access to the web server user account to gain root privileges via a symlink attack on the error log.
Do I need to act?
~
9.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Vendors
References (30)
Mailing List
http://seclists.org/fulldisclosure/2016/Nov/78
Mailing List
http://seclists.org/fulldisclosure/2017/Jan/33
Vendor Advisory
http://www.debian.org/security/2016/dsa-3701
Third Party Advisory
http://www.securityfocus.com/archive/1/539796/100/0/threaded
Third Party Advisory
http://www.securityfocus.com/bid/93903
Third Party Advisory
http://www.securitytracker.com/id/1037104
Vendor Advisory
http://www.ubuntu.com/usn/USN-3114-1
Third Party Advisory
https://security.gentoo.org/glsa/201701-22
Mailing List
http://seclists.org/fulldisclosure/2016/Nov/78
Mailing List
http://seclists.org/fulldisclosure/2017/Jan/33
Vendor Advisory
http://www.debian.org/security/2016/dsa-3701
Third Party Advisory
http://www.securityfocus.com/archive/1/539796/100/0/threaded
and 10 more references
45
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
11/34 · Low
Exposure
10/34 · Low