Vulnerability Description
The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condition (time of check, time of use). With this authorization method, the owner of a process requesting a polkit operation is checked by polkitd via /proc/<pid>/status, by which time the requesting process may have been replaced by a different process with the same PID that has different privileges then the original requester.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Backintime Project | Backintime | <= 1.1.18 |
Related Weaknesses (CWE)
References
- https://github.com/bit-team/backintime/commit/7f208dc547f569b689c888103e3b593a48Third Party Advisory
- https://github.com/bit-team/backintime/commit/7f208dc547f569b689c888103e3b593a48Third Party Advisory
FAQ
What is CVE-2017-7572?
CVE-2017-7572 is a vulnerability with a CVSS score of 8.1 (HIGH). The _checkPolkitPrivilege function in serviceHelper.py in Back In Time (aka backintime) 1.1.18 and earlier uses a deprecated polkit authorization method (unix-process) that is subject to a race condit...
How severe is CVE-2017-7572?
CVE-2017-7572 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7572?
Check the references section above for vendor advisories and patch information. Affected products include: Backintime Project Backintime.