Vulnerability Description
Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. A new line character can be used to inject a Password helper parameter into the configuration data passed to VPNC, allowing an attacker to execute arbitrary commands as root.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Network Manager Vpnc | < 1.2.6 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.novell.com/show_bug.cgi?id=1101147ExploitIssue TrackingThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10900Issue TrackingPatchThird Party Advisory
- https://download.gnome.org/sources/NetworkManager-vpnc/1.2/NetworkManager-vpnc-1Third Party AdvisoryVendor Advisory
- https://gitlab.gnome.org/GNOME/NetworkManager-vpnc/commit/07ac18a32b4PatchThird Party AdvisoryVendor Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00048.htmlThird Party Advisory
- https://pulsesecurity.co.nz/advisories/NM-VPNC-PrivescExploitThird Party Advisory
- https://security.gentoo.org/glsa/201808-03Third Party Advisory
- https://www.debian.org/security/2018/dsa-4253Third Party Advisory
- https://www.exploit-db.com/exploits/45313/ExploitThird Party AdvisoryVDB Entry
- https://bugzilla.novell.com/show_bug.cgi?id=1101147ExploitIssue TrackingThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10900Issue TrackingPatchThird Party Advisory
- https://download.gnome.org/sources/NetworkManager-vpnc/1.2/NetworkManager-vpnc-1Third Party AdvisoryVendor Advisory
- https://gitlab.gnome.org/GNOME/NetworkManager-vpnc/commit/07ac18a32b4PatchThird Party AdvisoryVendor Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00048.htmlThird Party Advisory
- https://pulsesecurity.co.nz/advisories/NM-VPNC-PrivescExploitThird Party Advisory
FAQ
What is CVE-2018-10900?
CVE-2018-10900 is a vulnerability with a CVSS score of 7.8 (HIGH). Network Manager VPNC plugin (aka networkmanager-vpnc) before version 1.2.6 is vulnerable to a privilege escalation attack. A new line character can be used to inject a Password helper parameter into t...
How severe is CVE-2018-10900?
CVE-2018-10900 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10900?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Network Manager Vpnc, Debian Debian Linux.