SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   SETroubleShoot Vendors:   Red Hat
(Oracle Issues Fix for Oracle Linux) SETroubleShoot allow_execmod Plugin Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1036167
SecurityTracker URL:  http://securitytracker.com/id/1036167
CVE Reference:   CVE-2016-4444, CVE-2016-4446, CVE-2016-4989   (Links to External Site)
Date:  Jun 24 2016
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in SETroubleShoot. A local user can obtain root privileges on the target system.

A local user can exploit flaws in the allow_execmod plugin to execute arbitrary shell commands on the target system with root privileges.

Milos Malik (Red Hat) reported these vulnerabilities.

Impact:   A local user can obtain root privileges on the target system.
Solution:   Oracle has issued a fix for CVE-2016-4444, CVE-2016-4446, and CVE-2016-4989.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2016-1293.html

Vendor URL:  linux.oracle.com/errata/ELSA-2016-1293.html (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Jun 22 2016 SETroubleShoot allow_execmod Plugin Lets Local Users Obtain Root Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2016-1293 Important: Oracle Linux 7 setroubleshoot and setroubleshoot-plugins security update

Oracle Linux Security Advisory ELSA-2016-1293

http://linux.oracle.com/errata/ELSA-2016-1293.html

The following updated rpms for Oracle Linux 7 have been uploaded to the 
Unbreakable Linux Network:

x86_64:
setroubleshoot-3.2.24-4.0.1.el7_2.x86_64.rpm
setroubleshoot-plugins-3.0.59-2.0.1.el7_2.noarch.rpm
setroubleshoot-server-3.2.24-4.0.1.el7_2.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol7/SRPMS-updates/setroubleshoot-3.2.24-4.0.1.el7_2.src.rpm
http://oss.oracle.com/ol7/SRPMS-updates/setroubleshoot-plugins-3.0.59-2.0.1.el7_2.src.rpm



Description of changes:

setroubleshoot
[3.2.24-4.0.1]
- Add setroubleshoot-oracle-enterprise.patch to change bug reporting
   URL to linux.oracle.com

[3.2.24-4]
- Catch all subprocess module exceptions

[3.2.24-3]
- Use subprocess.check_output() with a sequence of program arguments

[3.2.24-2]
- Do not use dangerous shell=True

setroubleshoot-plugins
[3.0.59-2.0.1]
- Add setroubleshoot-plugins-oracle-config.patch to use oracle url
- Add setroubleshoot-plugins-oracle-po.patch to use oracle url for po

[3.0.59-2]
- Don't use commands.get*output()
Resolves: CVE-2016-4444, CVE-2016-4446


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC