{ "id": "CVE-2015-8946", "sourceIdentifier": "cve@mitre.org", "published": "2016-07-22T14:59:00.147", "lastModified": "2016-07-27T15:46:05.223", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "ecryptfs-setup-swap in eCryptfs before 111 does not prevent the unencrypted swap partition from activating during boot when using GPT partitioning and certain versions of systemd, which allows local users to obtain sensitive information via unspecified vectors." }, { "lang": "es", "value": "ecryptfs-setup-swap en eCryptfs en versiones anteriores a 111 no impide la activaci\u00f3n de la partici\u00f3n de intercambio sin cifrar durante el inicio cuando se utiliza el particionamiento GPT y ciertas versiones de systemd, lo que permite a usuarios locales obtener informaci\u00f3n sensible a trav\u00e9s de vectores no especificados." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW" }, "exploitabilityScore": 1.8, "impactScore": 1.4 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": true, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:ecryptfs:ecryptfs-utils:*:*:*:*:*:*:*:*", "versionEndIncluding": "110", "matchCriteriaId": "76E0F5E8-3299-416E-8931-D7F9F68CD4D0" } ] } ] } ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2016/07/13/2", "source": "cve@mitre.org" }, { "url": "http://www.openwall.com/lists/oss-security/2016/07/14/3", "source": "cve@mitre.org" }, { "url": "http://www.ubuntu.com/usn/USN-3032-1", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/857", "source": "cve@mitre.org" }, { "url": "https://bugs.launchpad.net/ubuntu/+source/ecryptfs-utils/+bug/1447282", "source": "cve@mitre.org" } ] }