An issue was discovered in Ubuntu wpa_supplicant that resulted in loading of arbitrary shared objects, which allows a local unprivileged attacker to escalate privileges to the user that wpa_supplicant runs as (usually root).
Membership in the netdev group or access to the dbus interface of wpa_supplicant allow an unprivileged user to specify an arbitrary path to a module to be loaded by the wpa_supplicant process; other escalation paths might exist.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613 | Exploit Issue Tracking |
https://snyk.io/blog/abusing-ubuntu-root-privilege-escalation/ | Exploit Third Party Advisory |
https://ubuntu.com/security/notices/USN-6945-1 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Sep 2024, 13:09
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:w1.fi:wpa_supplicant:-:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
First Time |
Canonical ubuntu Linux
W1.fi wpa Supplicant Canonical W1.fi |
|
References | () https://bugs.launchpad.net/ubuntu/+source/wpa/+bug/2067613 - Exploit, Issue Tracking | |
References | () https://snyk.io/blog/abusing-ubuntu-root-privilege-escalation/ - Exploit, Third Party Advisory | |
References | () https://ubuntu.com/security/notices/USN-6945-1 - Vendor Advisory |
11 Sep 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
07 Aug 2024, 09:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-07 09:16
Updated : 2024-09-17 13:09
NVD link : CVE-2024-5290
Mitre link : CVE-2024-5290
CVE.ORG link : CVE-2024-5290
JSON object : View
Products Affected
canonical
- ubuntu_linux
w1.fi
- wpa_supplicant
CWE
CWE-427
Uncontrolled Search Path Element