Back In Time up to 1.1.18 /proc//status authorization race condition
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.8 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Back In Time up to 1.1.18. This affects the function authorization of the file /proc/<pid>/status. The manipulation results in race condition.
This vulnerability is known as CVE-2017-7572. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
Details
A vulnerability classified as critical has been found in Back In Time up to 1.1.18. Affected is the function authorization of the file /proc/<pid>/status. The manipulation with an unknown input leads to a race condition vulnerability. CWE is classifying the issue as CWE-362. The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc/<pid>/status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.
The bug was discovered 04/06/2017. The weakness was published 04/06/2017 (GitHub Repository). The advisory is shared for download at github.com. This vulnerability is traded as CVE-2017-7572 since 04/06/2017. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are known technical details, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 99610 (Fedora 24 : backintime (2017-7c9a9b2b36)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Fedora Local Security Checks and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 276579 (Fedora Security Update for backintime (FEDORA-2017-7c9a9b2b36)).
Upgrading eliminates this vulnerability. A possible mitigation has been published 3 weeks after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (99610). VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Name
Version
- 1.1.0
- 1.1.1
- 1.1.2
- 1.1.3
- 1.1.4
- 1.1.5
- 1.1.6
- 1.1.7
- 1.1.8
- 1.1.9
- 1.1.10
- 1.1.11
- 1.1.12
- 1.1.13
- 1.1.14
- 1.1.15
- 1.1.16
- 1.1.17
- 1.1.18
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.0VulDB Meta Temp Score: 8.4
VulDB Base Score: 9.8
VulDB Temp Score: 8.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 8.1
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Race conditionCWE: CWE-362
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 99610
Nessus Name: Fedora 24 : backintime (2017-7c9a9b2b36)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 867773
OpenVAS Name: Fedora Update for backintime FEDORA-2017-8dce7a3940
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: github.com
Timeline
04/06/2017 🔍04/06/2017 🔍
04/06/2017 🔍
04/06/2017 🔍
04/07/2017 🔍
04/22/2017 🔍
04/24/2017 🔍
08/24/2024 🔍
Sources
Advisory: FEDORA-2017-7c9a9b2b36Status: Not defined
CVE: CVE-2017-7572 (🔍)
GCVE (CVE): GCVE-0-2017-7572
GCVE (VulDB): GCVE-100-99360
Entry
Created: 04/07/2017 09:08Updated: 08/24/2024 00:42
Changes: 04/07/2017 09:08 (68), 12/30/2019 08:04 (3), 11/27/2022 09:34 (5), 11/27/2022 09:35 (1), 08/24/2024 00:42 (18)
Complete: 🔍
Cache ID: 216:FF6:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.