Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-20197

Опубликовано: 07 янв. 2021
Источник: redhat
CVSS3: 4.2
EPSS Низкий

Описание

There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.

There is an open race window when writing output in the following utilities in GNU binutils1: ar, objcopy, strip, and ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-59: Improper Link Resolution Before File Access ('Link Following') vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Access to the platform is granted only after successful authentication through multifactor authentication (MFA). MFA combined with least privilege and RBAC restricts access to only authorized users, processes, and roles, minimizing the number of users who would be able to access or modify sensitive and non-sensitive files. Red Hat also enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected through system compartmentalization. FIPS endpoints are enabled for all AWS GovCloud services that are used within the platform environment, ensuring that sensitive data stored on the system is encrypted or otherwise protected. Together, these controls help to prevent unauthorized access to files or the ability to manipulate the links to files.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6binutilsOut of support scope
Red Hat Enterprise Linux 7binutilsOut of support scope
Red Hat Enterprise Linux 8gcc-toolset-10-binutilsFix deferred
Red Hat Enterprise Linux 8gcc-toolset-9-binutilsAffected
Red Hat Enterprise Linux 9binutilsAffected
Red Hat Enterprise Linux 8binutilsFixedRHSA-2021:436409.11.2021
Red Hat Enterprise Linux 8binutilsFixedRHSA-2021:436409.11.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=1913743binutils: Race window allows users to own arbitrary files

EPSS

Процентиль: 41%
0.00193
Низкий

4.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 4 лет назад

There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.

CVSS3: 6.3
nvd
больше 4 лет назад

There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.

CVSS3: 6.3
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 6.3
debian
больше 4 лет назад

There is an open race window when writing output in the following util ...

CVSS3: 6.3
github
больше 3 лет назад

There is an open race window when writing output in the following utilities in GNU binutils version 2.35 and earlier:ar, objcopy, strip, ranlib. When these utilities are run as a privileged user (presumably as part of a script updating binaries across different users), an unprivileged user can trick these utilities into getting ownership of arbitrary files through a symlink.

EPSS

Процентиль: 41%
0.00193
Низкий

4.2 Medium

CVSS3