Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-37705

Опубликовано: 07 фев. 2023
Источник: redhat
CVSS3: 6.7

Описание

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

A flaw was found in Amanda. The runtar SUID binary executes /usr/bin/tar as root without properly validating its arguments, possibly leading to escalation of privileges from the regular user "amandabackup" to root.

Отчет

This flaw has been rated Low on Red Hat Enterprise Linux since unprivileged users can't pass arbitrary arguments to the runtar SUID binary. By default, only users in the "disk" group can execute the runtar binary on RHEL.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6amandaOut of support scope
Red Hat Enterprise Linux 7amandaOut of support scope
Red Hat Enterprise Linux 8amandaFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-269
https://bugzilla.redhat.com/show_bug.cgi?id=2167744amanda: runtar: crafted arguments can lead to local privilege escalation

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
ubuntu
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
nvd
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

CVSS3: 6.7
debian
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the bac ...

CVSS3: 7.8
github
почти 3 года назад

A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user can acquire root privileges. The vulnerable component is the runtar SUID program, which is a wrapper to run /usr/bin/tar with specific arguments that are controllable by the attacker. This program mishandles the arguments passed to tar binary (it expects that the argument name and value are separated with a space; however, separating them with an equals sign is also supported),

suse-cvrf
почти 3 года назад

Security update for amanda

6.7 Medium

CVSS3