7
CVSSv3

CVE-2016-4989

Published: 11/04/2017 Updated: 17/04/2017
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

setroubleshoot allows local users to bypass an intended container protection mechanism and execute arbitrary commands by (1) triggering an SELinux denial with a crafted file name, which is handled by the _set_tpath function in audit_data.py or via a crafted (2) local_id or (3) analysis_id field in a crafted XML document to the run_fix function in SetroubleshootFixit.py, related to the subprocess.check_output and commands.getstatusoutput functions, a different vulnerability than CVE-2016-4445.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

setroubleshoot project setroubleshoot

redhat enterprise linux workstation 7.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux desktop 7.0

redhat enterprise linux server 7.0

Vendor Advisories

Shell command injection flaws were found in the way the setroubleshoot executed external commands A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with root privileges ...