CVE-2017-8900
Publication date 11 May 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
LightDM through 1.22.0, when systemd is used in Ubuntu 16.10 and 17.x, allows physically proximate attackers to bypass intended AppArmor restrictions and visit the home directories of arbitrary users by establishing a guest session.
Status
Package | Ubuntu Release | Status |
---|---|---|
lightdm | ||
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty | Not in release |
Notes
tyhicks
This issue was introduced when the user session handling moved from upstart to systemd in Ubuntu 16.10.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.6 · Medium |
Attack vector | Physical |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3285-1
- LightDM vulnerability
- 12 May 2017