Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-41974

Опубликовано: 24 окт. 2022
Источник: redhat
CVSS3: 7.8

Описание

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.

A vulnerability was found in the device-mapper-multipath. The device-mapper-multipath allows local users to obtain root access, exploited alone or in conjunction with CVE-2022-41973. Local users that are able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This issue occurs because an attacker can repeat a keyword, which is mishandled when arithmetic ADD is used instead of bitwise OR. This could lead to local privilege escalation to root.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6device-mapper-multipathNot affected
Red Hat Enterprise Linux 7device-mapper-multipathFixedRHSA-2022:718625.10.2022
Red Hat Enterprise Linux 8device-mapper-multipathFixedRHSA-2022:719225.10.2022
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutionsdevice-mapper-multipathFixedRHSA-2022:718725.10.2022
Red Hat Enterprise Linux 8.2 Extended Update Supportdevice-mapper-multipathFixedRHSA-2022:718825.10.2022
Red Hat Enterprise Linux 8.4 Extended Update Supportdevice-mapper-multipathFixedRHSA-2022:719127.10.2022
Red Hat Enterprise Linux 9device-mapper-multipathFixedRHSA-2022:718525.10.2022
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8redhat-virtualization-hostFixedRHSA-2022:859822.11.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-285
https://bugzilla.redhat.com/show_bug.cgi?id=2133988device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 2 лет назад

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.

CVSS3: 7.8
nvd
больше 2 лет назад

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to obtain root access, as exploited alone or in conjunction with CVE-2022-41973. Local users able to write to UNIX domain sockets can bypass access controls and manipulate the multipath setup. This can lead to local privilege escalation to root. This occurs because an attacker can repeat a keyword, which is mishandled because arithmetic ADD is used instead of bitwise OR.

CVSS3: 7.8
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.8
debian
больше 2 лет назад

multipath-tools 0.7.0 through 0.9.x before 0.9.2 allows local users to ...

suse-cvrf
больше 2 лет назад

Security update for multipath-tools

7.8 High

CVSS3