10
CVSSv2

CVE-2012-2653

Published: 12/07/2012 Updated: 28/11/2016
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow malicious users to gain root privileges by leveraging other vulnerabilities in the daemon.

Vulnerable Product Search on Vulmon Subscribe to Product

lawrence berkeley national laboratory arpwatch 2.1a15

Vendor Advisories

Debian Bug report logs - #674715 CVE-2012-2653: initgroups() adds gid 0 to the group list Package: arpwatch; Maintainer for arpwatch is Debian Security Tools <team+pkg-security@trackerdebianorg>; Source for arpwatch is src:arpwatch (PTS, buildd, popcon) Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Sat, ...
Steve Grubb from Red Hat discovered that a patch for arpwatch (as shipped at least in Red Hat and Debian distributions) in order to make it drop root privileges would fail to do so and instead add the root group to the list of the daemon uses For the stable distribution (squeeze), this problem has been fixed in version 21a15-11+squeeze1 For the ...