CVE-2016-0727

The crontab script in the ntp package before 1:4.2.6.p3+dfsg-1ubuntu3.11 on Ubuntu 12.04 LTS, before 1:4.2.6.p5+dfsg-3ubuntu2.14.04.10 on Ubuntu 14.04 LTS, on Ubuntu Wily, and before 1:4.2.8p4+dfsg-3ubuntu5.3 on Ubuntu 16.04 LTS allows local users with access to the ntp account to write to arbitrary files and consequently gain privileges via vectors involving statistics directory cleanup.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 02:42

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/141913/NTP-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/81552 - VDB Entry, Third Party Advisory () http://www.securityfocus.com/bid/81552 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1034808 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1034808 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-3096-1 - Vendor Advisory () http://www.ubuntu.com/usn/USN-3096-1 - Vendor Advisory
References () https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1528050 - Issue Tracking, Patch, Vendor Advisory () https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1528050 - Issue Tracking, Patch, Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1382369 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=1382369 - Issue Tracking

Information

Published : 2017-04-14 18:59

Updated : 2024-11-21 02:42


NVD link : CVE-2016-0727

Mitre link : CVE-2016-0727

CVE.ORG link : CVE-2016-0727


JSON object : View

Products Affected

canonical

  • ubuntu_linux
CWE
CWE-264

Permissions, Privileges, and Access Controls