Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title VDE: Privilege escalation
Informations
Name GLSA-201711-11 First vendor Publication 2017-11-12
Vendor Gentoo Last vendor Modification 2017-11-12
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A vulnerability was discovered in VDE which may allow local users to gain root privileges.

Background

VDE is an ethernet compliant virtual network that can be spawned over a set of physical computer over the Internet.

Description

It was discovered that Gentoo’s default VDE installation suffered from a privilege escalation vulnerability in the init script. This script calls an unsafe 'chown' command which gives members from "qemu" group root privileges.

Impact

A local attacker could escalate privileges to root.

Workaround

There is no known workaround at this time.

Resolution

All VDE users should upgrade to the latest version:

Â
# emerge --sync
Â
# emerge --ask --oneshot --verbose ">=net-misc/vde-2.3.2-r4"

References

[ 1 ] CVE-2017-16638
      https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16638

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

 https://security.gentoo.org/glsa/201711-11

Original Source

Url : http://security.gentoo.org/glsa/glsa-201711-11.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-732 Incorrect Permission Assignment for Critical Resource (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Nessus® Vulnerability Scanner

Date Description
2017-11-13 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201711-11.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2017-11-29 21:24:12
  • Multiple Updates
2017-11-14 13:24:55
  • Multiple Updates
2017-11-13 00:23:03
  • First insertion