Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-32802

Опубликовано: 28 мая 2025
Источник: redhat
CVSS3: 6.1

Описание

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

A vulnerability was found in the Kea package. If an attacker has access to a local user account and the Kea API entry points are not secured, the attacker may use the API to modify Kea's configuration files or overwrite any system's file which a Kea running user has write access. This may be leveraged to cause system-wide denial of service or to achieve a local privilege escalation. Additionally, if Kea's control sockets are enabled and placed in an insecure location, any local user may impersonate the Kea service and prevent the real Kea service from starting.

Отчет

This vulnerability is rated as a moderate severity because the vulnerability was found in Kea's configuration and API directives related to file path handling, where this issue will triggered when an attacker has access to a local unprivileged user account and the Kea API entry points are unsecured or control sockets are in insecure locations, this issue leads to system-wide DoS and significantly impacting system integrity.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-250
https://bugzilla.redhat.com/show_bug.cgi?id=2367495kea: Insecure handling of file paths allows multiple local attacks

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
nvd
2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

CVSS3: 6.1
debian
2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrar ...

CVSS3: 6.1
github
2 месяца назад

Kea configuration and API directives can be used to overwrite arbitrary files, subject to permissions granted to Kea. Many common configurations run Kea as root, leave the API entry points unsecured by default, and/or place the control sockets in insecure paths. This issue affects Kea versions 2.4.0 through 2.4.1, 2.6.0 through 2.6.2, and 2.7.0 through 2.7.8.

oracle-oval
около 1 месяца назад

ELSA-2025-9178: kea security update (IMPORTANT)

6.1 Medium

CVSS3