Логотип exploitDog
bind:CVE-2023-3899
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-3899

Количество 7

Количество 7

redhat логотип

CVE-2023-3899

больше 2 лет назад

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
EPSS: Низкий
nvd логотип

CVE-2023-3899

больше 2 лет назад

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
EPSS: Низкий
rocky логотип

RLSA-2023:4708

больше 2 лет назад

Important: subscription-manager security update

EPSS: Низкий
rocky логотип

RLSA-2023:4706

больше 2 лет назад

Important: subscription-manager security update

EPSS: Низкий
github логотип

GHSA-wp8h-m67c-cxpw

больше 2 лет назад

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-04878

больше 2 лет назад

Уязвимость метода SetAll() системы межпроцессного взаимодействия D-Bus операционных систем Red Hat Enterprise Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Низкий
redos логотип

ROS-20231018-03

около 2 лет назад

Уязвимость subscription-manager

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-3899

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-3899

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2023:4708

Important: subscription-manager security update

0%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2023:4706

Important: subscription-manager security update

0%
Низкий
больше 2 лет назад
github логотип
GHSA-wp8h-m67c-cxpw

A vulnerability was found in subscription-manager that allows local privilege escalation due to inadequate authorization. The D-Bus interface com.redhat.RHSM1 exposes a significant number of methods to all users that could change the state of the registration. By using the com.redhat.RHSM1.Config.SetAll() method, a low-privileged local user could tamper with the state of the registration, by unregistering the system or by changing the current entitlements. This flaw allows an attacker to set arbitrary configuration directives for /etc/rhsm/rhsm.conf, which can be abused to cause a local privilege escalation to an unconfined root.

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-04878

Уязвимость метода SetAll() системы межпроцессного взаимодействия D-Bus операционных систем Red Hat Enterprise Linux, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20231018-03

Уязвимость subscription-manager

CVSS3: 7.8
0%
Низкий
около 2 лет назад

Уязвимостей на страницу