Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-10152

Опубликовано: 03 мая 2016
Источник: redhat
CVSS3: 7
CVSS2: 3.7

Описание

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

Отчет

Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5hesiodWill not fix
Red Hat Enterprise Linux 6hesiodWill not fix
Red Hat Enterprise Linux 7hesiodWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-547
https://bugzilla.redhat.com/show_bug.cgi?id=1332493hesiod: Use of hard-coded unsafe configuration if configuration file cannot be opened

7 High

CVSS3

3.7 Low

CVSS2

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

CVSS3: 9.8
nvd
почти 9 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

CVSS3: 9.8
debian
почти 9 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls ba ...

CVSS3: 9.8
github
больше 3 лет назад

The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

CVSS3: 9.8
fstec
почти 10 лет назад

Уязвимость функции read_config_file (lib/hesiod.c) демона для обеспечения доступа к базам данных DNS Hesiod, позволяющая нарушителю получить привилегии root

7 High

CVSS3

3.7 Low

CVSS2