Description
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
Exploits (2)
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry x_refsource_confirm
https://launchpad.net/bugs/1677924
Third Party Advisory, VDB Entry x_refsource_confirm
https://lists.freedesktop.org/archives/lightdm/2017-April/001059.html
Third Party Advisory, VDB Entry x_refsource_confirm
http://bazaar.launchpad.net/~lightdm-team/lightdm/trunk/revision/2478
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/41923/
Third Party Advisory x_refsource_confirm
https://www.ubuntu.com/usn/usn-3255-1/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/97486
Scores
CVSS v3
7.3
EPSS
0.0174
EPSS Percentile
82.6%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (3)
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
16.10
lightdm_project/lightdm
< 1.22.0
Published
Apr 05, 2017
Tracked Since
Feb 18, 2026