Логотип exploitDog
bind:"CVE-2023-3899"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-3899"

Количество 7

Количество 7

redhat логотип

CVE-2023-3899

почти 2 года назад

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-3899

почти 2 года назад

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
EPSS: Низкий
rocky логотип

RLSA-2023:4708

почти 2 года назад

Important: subscription-manager security update

EPSS: Низкий
rocky логотип

RLSA-2023:4706

почти 2 года назад

Important: subscription-manager security update

EPSS: Низкий
github логотип

GHSA-wp8h-m67c-cxpw

почти 2 года назад

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-04878

почти 2 года назад

Уязвимость метода SetAll() системы межпроцессного взаимодействия D-Bus операционных систем Red Hat Enterprise Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20231018-03

больше 1 года назад

Уязвимость subscription-manager

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-3899

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-3899

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
rocky логотип
RLSA-2023:4708

Important: subscription-manager security update

0%
Низкий
почти 2 года назад
rocky логотип
RLSA-2023:4706

Important: subscription-manager security update

0%
Низкий
почти 2 года назад
github логотип
GHSA-wp8h-m67c-cxpw

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-04878

Уязвимость метода SetAll() системы межпроцессного взаимодействия D-Bus операционных систем Red Hat Enterprise Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
почти 2 года назад
redos логотип
ROS-20231018-03

Уязвимость subscription-manager

CVSS3: 7.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу