Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3215

Опубликовано: 08 дек. 2012
Источник: redhat
CVSS2: 6.9

Описание

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

A flaw was found in the way seunshare, a utility for running executables under a different security context, used the capng_lock functionality of the libcap-ng library. The subsequent invocation of suid root binaries that relied on the fact that the setuid() system call, among others, also sets the saved set-user-ID when dropping the binaries' process privileges, could allow a local, unprivileged user to potentially escalate their privileges on the system. Note: the fix for this issue is the kernel part of the overall fix, and introduces the PR_SET_NO_NEW_PRIVS functionality and the related SELinux exec transitions support.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5policycoreutilsWill not fix
Red Hat Enterprise Linux 6libcap-ngWill not fix
Red Hat Enterprise Linux 6policycoreutilsWill not fix
Red Hat Enterprise Linux 6selinux-policyWill not fix
Red Hat Enterprise Linux 7policycoreutilsNot affected
Red Hat Enterprise Linux 7selinux-policyNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2015:086421.04.2015
Red Hat Enterprise Linux 7libcap-ngFixedRHBA-2015:216119.11.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-270
https://bugzilla.redhat.com/show_bug.cgi?id=1095855policycoreutils: local privilege escalation via seunshare

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

nvd
больше 11 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

debian
больше 11 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissi ...

suse-cvrf
больше 8 лет назад

Security update for libcap-ng

github
больше 3 лет назад

seunshare in policycoreutils 2.2.5 is owned by root with 4755 permissions, and executes programs in a way that changes the relationship between the setuid system call and the getresuid saved set-user-ID value, which makes it easier for local users to gain privileges by leveraging a program that mistakenly expected that it could permanently drop privileges.

6.9 Medium

CVSS2