614
VMScore

CVE-2016-4445

Published: 11/04/2017 Updated: 17/04/2017
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The fix_lookup_id function in sealert in setroubleshoot prior to 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

setroubleshoot project setroubleshoot

redhat enterprise linux hpc node 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server 7.0

Vendor Advisories

A shell command injection flaw was found in the way the setroubleshoot executed external commands A local attacker able to trigger certain SELinux denials could use this flaw to execute arbitrary code with root privileges ...