CVE-2017-10600
low-risk
Published 2017-07-11
ubuntu-image 1.0 before 2017-07-07, when invoked as non-root, creates files in the resulting image with the uid of the invoking user. When the resulting image is booted, a local attacker with the same uid as the image creator has unintended access to cloud-init and snapd directories.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
LOCAL
/ LOW complexity
Affected Products (1)
Ubuntu-Image
Affected Vendors
References (2)
Third Party Advisory
https://forum.snapcraft.io/t/ownership-bug-in-ubuntu-image/1285
Third Party Advisory
https://forum.snapcraft.io/t/ownership-bug-in-ubuntu-image/1285
24
/ 100
low-risk
Severity
19/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
5/34 · Minimal