First published: Wed Jan 22 2020(Updated: )
The pkgmgr system service in Tizen allows an unprivileged process to perform package management actions, due to improper D-Bus security policy configurations. Such actions include installing, decrypting, and killing other packages. This affects Tizen before 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear series before build RE2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Tizen | =1.0 | |
Linux Tizen | =1.0-m1 | |
Linux Tizen | =2.0 | |
Linux Tizen | =2.1 | |
Linux Tizen | =2.2 | |
Linux Tizen | =2.2.1 | |
Linux Tizen | =2.3 | |
Linux Tizen | =2.3.1 | |
Linux Tizen | =2.4 | |
Linux Tizen | =3.0 | |
Linux Tizen | =3.0-m2 | |
Linux Tizen | =3.0-m3 | |
Linux Tizen | =4.0-m1 | |
Linux Tizen | =4.0-m2 | |
Linux Tizen | =4.0-m3 | |
Linux Tizen | =5.0 | |
Samsung Galaxy Gear |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16262 is a vulnerability in the pkgmgr system service in Tizen that allows an unprivileged process to perform package management actions.
The severity of CVE-2018-16262 is high with a severity value of 8.8.
CVE-2018-16262 affects Tizen before 5.0 M1, and Tizen-based firmwares including 1.0, 1.0-m1, 2.0, 2.1, 2.2, 2.2.1, 2.3, 2.3.1, 2.4, 3.0, 3.0-m2, 3.0-m3, 4.0-m1, 4.0-m2, 4.0-m3, and 5.0.
An unprivileged process can exploit CVE-2018-16262 by performing package management actions, such as installing, decrypting, and killing other packages.
More information about CVE-2018-16262 can be found at the following references: [link 1](https://media.defcon.org/DEF%20CON%2026/DEF%20CON%2026%20presentations/Dongsung%20Kim%20and%20Hyoung%20Kee%20Choi%20-%20Updated/DEFCON-26-Dongsung-Kim-and-Hyoung-Kee-Choi-Your-Watch-Can-Watch-You-Updated.pdf), [link 2](https://review.tizen.org/git/?p=platform/core/appfw/pkgmgr-server.git;a=commit;h=aac8a95859828a058d8e06893982b11ebc81dd78), [link 3](https://www.youtube.com/watch?v=3IdgBwbOT-g&feature=youtu.be).