Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4445

Опубликовано: 21 июн. 2016
Источник: redhat
CVSS2: 6.2
EPSS Низкий

Описание

The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.

A shell command injection flaw was found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use this flaw to execute arbitrary code with root privileges.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5setroubleshootNot affected
Red Hat Enterprise Linux 6setroubleshootFixedRHSA-2016:126721.06.2016
Red Hat Enterprise Linux 6setroubleshoot-pluginsFixedRHSA-2016:126721.06.2016
Red Hat Enterprise Linux 7setroubleshootFixedRHBA-2015:228719.11.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1339183setroubleshoot: insecure use of commands.getstatusoutput in sealert

EPSS

Процентиль: 22%
0.0007
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

CVSS3: 7
nvd
больше 8 лет назад

The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.

CVSS3: 7
github
больше 3 лет назад

The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.

oracle-oval
около 9 лет назад

ELSA-2016-1267: setroubleshoot and setroubleshoot-plugins security update (IMPORTANT)

EPSS

Процентиль: 22%
0.0007
Низкий

6.2 Medium

CVSS2