Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-44225

Опубликовано: 26 нояб. 2021
Источник: redhat
CVSS3: 7.5

Описание

In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property

A flaw was found in keepalived, where an improper authentication vulnerability allows an unprivileged user to change properties that could lead to an access-control bypass.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6keepalivedOut of support scope
Red Hat Enterprise Linux 7keepalivedOut of support scope
Red Hat Enterprise Linux 9keepalivedNot affected
Red Hat Enterprise Linux 8keepalivedFixedRHSA-2022:193010.05.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=2027156keepalived: dbus access control bypass

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 3 лет назад

In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property

CVSS3: 5.4
nvd
больше 3 лет назад

In Keepalived through 2.2.4, the D-Bus policy does not sufficiently restrict the message destination, allowing any user to inspect and manipulate any property. This leads to access-control bypass in some situations in which an unrelated D-Bus system service has a settable (writable) property

CVSS3: 5.4
msrc
больше 3 лет назад

Описание отсутствует

CVSS3: 5.4
debian
больше 3 лет назад

In Keepalived through 2.2.4, the D-Bus policy does not sufficiently re ...

suse-cvrf
почти 3 года назад

Security update for keepalived

7.5 High

CVSS3