Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-3560

Опубликовано: 03 июн. 2021
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6polkitNot affected
Red Hat Enterprise Linux 7polkitNot affected
Red Hat Enterprise Linux 9polkitNot affected
Red Hat Enterprise Linux 8polkitFixedRHSA-2021:223803.06.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportpolkitFixedRHSA-2021:223603.06.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportpolkitFixedRHSA-2021:223703.06.2021
Red Hat OpenShift Container Platform 4.7cri-oFixedRHSA-2021:255506.07.2021
Red Hat OpenShift Container Platform 4.7dhcpFixedRHSA-2021:255506.07.2021
Red Hat OpenShift Container Platform 4.7openshift-clientsFixedRHSA-2021:255506.07.2021
Red Hat OpenShift Container Platform 4.7openshift-kuryrFixedRHSA-2021:255506.07.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-754
https://bugzilla.redhat.com/show_bug.cgi?id=1961710polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync()

EPSS

Процентиль: 89%
0.04535
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.8
nvd
больше 3 лет назад

It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, elevating the privileges of the requestor to the root user. This flaw could be used by an unprivileged local attacker to, for example, create a new local administrator. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS3: 7.8
debian
больше 3 лет назад

It was found that polkit could be tricked into bypassing the credentia ...

suse-cvrf
почти 4 года назад

Security update for polkit

suse-cvrf
около 4 лет назад

Security update for polkit

EPSS

Процентиль: 89%
0.04535
Низкий

7.8 High

CVSS3