Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-49809

Опубликовано: 04 июл. 2025
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

mtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries.

A possible privilege escalation flaw was found in the MTR networking tool. This issue occurs in rare cases when the package is configured to run with sudo rules instead of setuid and stems from its improper handling in the execution of a program specified by the MTR_PACKET environment variable.

Отчет

The condition to exploit this vulnerability is not the default behavior on Linux systems and should rarely occur. In Red Hat Enterprise Linux (RHEL), mtr does not rely on sudo or setuid for privilege elevation. Instead, RHEL uses file system capabilities (cap_net_raw+ep) on the mtr-packet binary to grant the necessary privileges securely without requiring full root access. As a result, the vulnerable execution path (such as /etc/mtr.is.run.under.sudo) is not used in RHEL, rendering the exploit path non-functional in this environment. There is no need for custom sudo rules for mtr, which is the only configuration impacted by the reported issue. For more details see discussion upstream, https://github.com/traviscross/mtr/issues/541.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10mtrNot affected
Red Hat Enterprise Linux 6mtrOut of support scope
Red Hat Enterprise Linux 7mtrOut of support scope
Red Hat Enterprise Linux 8mtrNot affected
Red Hat Enterprise Linux 9mtrNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-829

EPSS

Процентиль: 5%
0.00023
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
4 месяца назад

mtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries.

CVSS3: 7.8
nvd
4 месяца назад

mtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries.

CVSS3: 7.8
msrc
4 месяца назад

mtr through 0.95, in certain privileged contexts, mishandles execution of a program specified by the MTR_PACKET environment variable. NOTE: mtr on macOS may often have Sudo rules, as an indirect consequence of Homebrew not installing setuid binaries.

CVSS3: 7.8
debian
4 месяца назад

mtr through 0.95, in certain privileged contexts, mishandles execution ...

CVSS3: 7.8
redos
3 месяца назад

Уязвимость mtr

EPSS

Процентиль: 5%
0.00023
Низкий

7.8 High

CVSS3