CVE-2016-2781 — Improper Input Validation in Coreutils
Severity
4.6MEDIUMNVD
EPSS
0.1%
top 77.28%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 7
Latest updateMay 13
Description
chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 1.5 | Impact: 2.7
Affected Packages10 packages
🔴Vulnerability Details
2GHSA▶
GHSA-vf3q-65gx-324p: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes↗2022-05-13
OSV▶
CVE-2016-2781: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes↗2017-02-07
📋Vendor Advisories
3Microsoft▶
chroot in GNU coreutils when used with --userspec allows local users to escape to the parent session via a crafted TIOCSTI ioctl call which pushes characters to the terminal's input buffer.↗2017-02-21
Debian▶
CVE-2016-2781: coreutils - chroot in GNU coreutils, when used with --userspec, allows local users to escape...↗2016