4.6
CVSSv2

CVE-2016-9151

Published: 19/11/2016 Updated: 17/02/2020
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 470
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Palo Alto Networks PAN-OS prior to 5.0.20, 5.1.x prior to 5.1.13, 6.0.x prior to 6.0.15, 6.1.x prior to 6.1.15, 7.0.x prior to 7.0.11, and 7.1.x prior to 7.1.6 allows local users to gain privileges via crafted values of unspecified environment variables.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

paloaltonetworks pan-os

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=913 This was fixed by PAN: securityadvisoriespaloaltonetworkscom/Home/Detail/67 The root_reboot utility is setuid root, but performs multiple calls to system() with attacker controlled data, such as this one: text:0804870F C7 44 24 04 78+ mov dword ptr ...
Source: bugschromiumorg/p/project-zero/issues/detail?id=912 The setuid root executable /usr/local/bin/root_trace essentially just does setuid(0) then system("/usr/local/bin/masterd"), which is a python script: $ ls -l /usr/local/bin/root_trace -rwsr-xr-x 1 root root 12376 Oct 17 2014 /usr/local/bin/root_trace As the environment is no ...