Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4989

Опубликовано: 21 июн. 2016
Источник: redhat
CVSS2: 6.9

Описание

setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.

Shell command injection flaws were found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with root privileges.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5setroubleshootNot affected
Red Hat Enterprise Linux 6setroubleshootFixedRHSA-2016:126721.06.2016
Red Hat Enterprise Linux 6setroubleshoot-pluginsFixedRHSA-2016:126721.06.2016
Red Hat Enterprise Linux 7setroubleshootFixedRHSA-2016:129323.06.2016
Red Hat Enterprise Linux 7setroubleshoot-pluginsFixedRHSA-2016:129323.06.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1346461setroubleshoot: command injection issues

6.9 Medium

CVSS2

Связанные уязвимости

CVSS3: 7
nvd
больше 8 лет назад

setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.

CVSS3: 7
github
больше 3 лет назад

setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.

oracle-oval
около 9 лет назад

ELSA-2016-1293: setroubleshoot and setroubleshoot-plugins security update (IMPORTANT)

oracle-oval
около 9 лет назад

ELSA-2016-1267: setroubleshoot and setroubleshoot-plugins security update (IMPORTANT)

6.9 Medium

CVSS2