{"containers":{"cna":{"affected":[{"platforms":["x86"],"product":"Endpoint Security for Linux Threat Prevention (ENSLTP)","vendor":"McAfee","versions":[{"status":"affected","version":"10.5.0"},{"status":"affected","version":"10.5.1 10.5.0"},{"lessThanOrEqual":"10.2.3 Hotfix 1246778","status":"affected","version":"10.2.3 Hotfix 1246778","versionType":"custom"}]}],"credits":[{"lang":"en","value":"RACK911Labs.com"}],"datePublic":"2018-09-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escalation to delete arbitrary files."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-363","description":"Race Condition Enabling Link Following (CWE-363)","lang":"en","type":"CWE"},{"cweId":"CWE-274","description":"Privilege Escalation (CWE-274)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2018-09-18T21:57:01.000Z","orgId":"01626437-bf8f-4d1c-912a-893b5eb04808","shortName":"trellix"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10248"}],"source":{"discovery":"EXTERNAL"},"title":"Endpoint Security for Linux Threat Prevention (ENSLTP) privilege escalation vulnerability","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@mcafee.com","ID":"CVE-2018-6693","STATE":"PUBLIC","TITLE":"Endpoint Security for Linux Threat Prevention (ENSLTP) privilege escalation vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Endpoint Security for Linux Threat Prevention (ENSLTP)","version":{"version_data":[{"affected":"=","platform":"x86","version_affected":"=","version_name":"10.5.0","version_value":"10.5.0"},{"affected":"=","platform":"x86","version_affected":"=","version_name":"10.5.1","version_value":"10.5.0"},{"affected":"<=","platform":"x86","version_affected":"<=","version_name":"10.2.3 Hotfix 1246778","version_value":"10.2.3 Hotfix 1246778"}]}}]},"vendor_name":"McAfee"}]}},"credit":[{"lang":"eng","value":"RACK911Labs.com"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An unprivileged user can delete arbitrary files on a Linux system running ENSLTP 10.5.1, 10.5.0, and 10.2.3 Hotfix 1246778 and earlier. By exploiting a time of check to time of use (TOCTOU) race condition during a specific scanning sequence, the unprivileged user is able to perform a privilege escalation to delete arbitrary files."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Race Condition Enabling Link Following (CWE-363)"},{"lang":"eng","value":"Privilege Escalation (CWE-274)"}]}]},"references":{"reference_data":[{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10248","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10248"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T06:10:11.241Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10248"}]}]},"cveMetadata":{"assignerOrgId":"01626437-bf8f-4d1c-912a-893b5eb04808","assignerShortName":"trellix","cveId":"CVE-2018-6693","datePublished":"2018-09-18T22:00:00.000Z","dateReserved":"2018-02-06T00:00:00.000Z","dateUpdated":"2024-08-05T06:10:11.241Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}