EMC RecoverPoint File Permission and Command Injection Bugs Let Local Users Obtain Root Privileges
|
SecurityTracker Alert ID: 1037727 |
SecurityTracker URL: http://securitytracker.com/id/1037727
|
CVE Reference:
CVE-2016-6648, CVE-2016-6649
(Links to External Site)
|
Date: Jan 27 2017
|
Impact:
Disclosure of system information, Execution of arbitrary code via local system, Root access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): prior to 4.4.1.1
|
Description:
Two vulnerabilities were reported in EMC RecoverPoint. A local user can obtain root privileges on the target system.
A local administrator user with configuration privileges can exploit a file permissions flaw to view a sensitive system file and gain elevated privileges [CVE-2016-6648].
Mike Erman and Joshua Burbrink from Northrop Grumman reported this vulnerability.
A local user administrator user with configuration privileges can exploit a command injection flaw to gain root privileges [CVE-2016-6649].
Geoffrey Janjua, Mike Erman, Josh Burbrink, and Ryan Bland from Northrop Grumman reported this vulnerability.
EMC RecoverPoint for Virtual Machines is also affected by these vulnerabilities.
|
Impact:
A local user can obtain root privileges on the target system.
|
Solution:
The vendor has issued a fix (4.4.1.1, 5.0; for Virtual Machines 4.3.1.4, 5.0; Advisory ESA-2016-132).
|
Vendor URL: www.emc.com/ (Links to External Site)
|
Cause:
Access control error
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|