Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-10156

Severity
7.8HIGH
EPSS
0.7%
top 27.73%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 23
Latest updateMay 17

Description

A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiansystemd< 229-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-4r87-5wgm-7h7m: A flaw in systemd v228 in /src/basic/fs-util2022-05-17
CVEList
CVE-2016-10156: A flaw in systemd v228 in /src/basic/fs-util2017-01-23
OSV
CVE-2016-10156: A flaw in systemd v228 in /src/basic/fs-util2017-01-23

💥Exploits & PoCs

1
Exploit-DB
Systemd 228 (SUSE 12 SP2 / Ubuntu Touch 15.04) - Local Privilege Escalation2017-01-24

📋Vendor Advisories

2
Red Hat
systemd: systemd creates world-writable suid files allowing root privilege escalation2017-01-24
Debian
CVE-2016-10156: systemd - A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files ...2016

💬Community

1
Bugzilla
CVE-2016-10156 systemd: systemd creates world-writable suid files allowing root privilege escalation2017-01-24
CVE-2016-10156 (HIGH CVSS 7.8) | A flaw in systemd v228 in /src/basi | cvebase.io