Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-41974

Опубликовано: 24 окт. 2022
Источник: redhat
CVSS3: 7.8

Описание

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.

A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6device-mapper-multipathNot affected
Red Hat Enterprise Linux 7device-mapper-multipathFixedRHSA-2022:718625.10.2022
Red Hat Enterprise Linux 8device-mapper-multipathFixedRHSA-2022:719225.10.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionsdevice-mapper-multipathFixedRHSA-2022:718725.10.2022
Red Hat Enterprise Linux 8.2 Extended Update Supportdevice-mapper-multipathFixedRHSA-2022:718825.10.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportdevice-mapper-multipathFixedRHSA-2022:719127.10.2022
Red Hat Enterprise Linux 9device-mapper-multipathFixedRHSA-2022:718525.10.2022
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8redhat-virtualization-hostFixedRHSA-2022:859822.11.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=2133988device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 3 лет назад

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.

CVSS3: 7.8
nvd
около 3 лет назад

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.

CVSS3: 7.8
msrc
около 3 лет назад

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword which is mishandled because arithmetic ADD is used instead of bitwise OR.

CVSS3: 7.8
debian
около 3 лет назад

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to ...

suse-cvrf
около 3 лет назад

Security update for multipath-tools

7.8 High

CVSS3