SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   SETroubleShoot Vendors:   Red Hat
(Oracle Issues Fix for Oracle Linux) SETroubleShoot allow_execmod Plugin Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1036150
SecurityTracker URL:  http://securitytracker.com/id/1036150
CVE Reference:   CVE-2016-4444, CVE-2016-4445, CVE-2016-4446, CVE-2016-4989   (Links to External Site)
Date:  Jun 22 2016
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in SETroubleShoot. A local user can obtain root privileges on the target system.

A local user can exploit flaws in the allow_execmod plugin to execute arbitrary shell commands on the target system with root privileges.

Milos Malik (Red Hat) reported these vulnerabilities.

Impact:   A local user can obtain root privileges on the target system.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-1267.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-1267.html (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6

Message History:   This archive entry is a follow-up to the message listed below.
Jun 22 2016 SETroubleShoot allow_execmod Plugin Lets Local Users Obtain Root Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2016-1267 Important: Oracle Linux 6 setroubleshoot and setroubleshoot-plugins security update

Oracle Linux Security Advisory ELSA-2016-1267

http://linux.oracle.com/errata/ELSA-2016-1267.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
setroubleshoot-3.0.47-12.0.1.el6_8.i686.rpm
setroubleshoot-doc-3.0.47-12.0.1.el6_8.i686.rpm
setroubleshoot-plugins-3.0.40-3.1.0.1.el6_8.noarch.rpm
setroubleshoot-server-3.0.47-12.0.1.el6_8.i686.rpm

x86_64:
setroubleshoot-3.0.47-12.0.1.el6_8.x86_64.rpm
setroubleshoot-doc-3.0.47-12.0.1.el6_8.x86_64.rpm
setroubleshoot-plugins-3.0.40-3.1.0.1.el6_8.noarch.rpm
setroubleshoot-server-3.0.47-12.0.1.el6_8.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/setroubleshoot-3.0.47-12.0.1.el6_8.src.rpm
http://oss.oracle.com/ol6/SRPMS-updates/setroubleshoot-plugins-3.0.40-3.1.0.1.el6_8.src.rpm



Description of changes:

setroubleshoot
[3.0.47-12.0.1]
- Add setroubleshoot-oracle-enterprise.patch to change bug reporting
   URL to linux.oracle.com

[3.0.47-12]
- Don't use command.get*output()
Resolves: CVE-2016-4445

setroubleshoot-plugins
[3.0.40-3.1.0.1]
- Add setroubleshoot-plugins-oracle-enterprise.patch

[3.0.40-3.1]
- Don't use commands.get*output()
Resolves: CVE-2016-4444, CVE-2016-4446



_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC