Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2019-7303

CWE-6287 documents7 sources
Severity
7.5HIGH
EPSS
1.2%
top 21.41%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 23
Latest updateMay 24

Description

A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 allows a strict mode snap to insert characters into a terminal on a 64-bit host. The seccomp rules were generated to match 64-bit ioctl(2) commands on a 64-bit platform; however, the Linux kernel only uses the lower 32 bits to determine which ioctl(2) commands to run. This issue affects: Canonical snapd versions prior to 2.37.4.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5canonical/snapdunspecified2.37.4
NVDcanonical/snapd< 2.37.4
Debiansnapd< 2.37.4-1+3

Also affects: Ubuntu Linux 14.04, 16.04, 18.04, 18.10

🔴Vulnerability Details

3
GHSA
GHSA-hhhq-qgvm-w5hp: A vulnerability in the seccomp filters of Canonical snapd before version 22022-05-24
OSV
CVE-2019-7303: A vulnerability in the seccomp filters of Canonical snapd before version 22019-04-23
CVEList
Snapd seccomp filter TIOCSTI ioctl bypass2019-04-23

💥Exploits & PoCs

1
Exploit-DB
snap - seccomp BBlacklist for TIOCSTI can be Circumvented2019-03-22

📋Vendor Advisories

2
Ubuntu
snapd vulnerability2019-03-21
Debian
CVE-2019-7303: snapd - A vulnerability in the seccomp filters of Canonical snapd before version 2.37.4 ...2019
CVE-2019-7303 (HIGH CVSS 7.5) | A vulnerability in the seccomp filt | cvebase.io