CVE-2017-7358
Publication date 4 April 2017
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
In LightDM through 1.22.0, a directory traversal issue in debian/guest-account.sh allows local attackers to own arbitrary directory path locations and escalate privileges to root when the guest user logs out.
Notes
tyhicks
This issue was reported to us by Beyond Security but they did not discover the issue. The discoverer is unknown.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | Required |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3255-1
- LightDM vulnerability
- 4 April 2017