Описание
In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.
Ссылки
- ExploitPatchThird Party Advisory
- Third Party AdvisoryVDB Entry
- ExploitPatchThird Party Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 9.13.10.01 (включая)
cpe:2.3:a:bmc:patrol:*:*:*:*:*:*:*:*
EPSS
Процентиль: 17%
0.00054
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-264
Связанные уязвимости
CVSS3: 7.8
github
больше 3 лет назад
In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.
EPSS
Процентиль: 17%
0.00054
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-264