SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   McAfee Web Gateway Vendors:   McAfee
(McAfee Issues Fix for McAfee Web Gateway) Sudo get_process_ttyname() Command Validation Flaw Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1039053
SecurityTracker URL:  http://securitytracker.com/id/1039053
CVE Reference:   CVE-2017-1000368   (Links to External Site)
Date:  Aug 2 2017
Impact:   Modification of system information, Modification of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.6.2.14 and prior, 7.7.2.2 and prior
Description:   A vulnerability was reported in Sudo. A local user can obtain root privileges on the target system. McAfee Web Gateway is affected.

A local user can issue a specially crafted sudo command to trigger a command validation flaw in the get_process_ttyname() process and cause the system to recognize the user's tty as an arbitrary file on the target system. A local user can exploit this to overwrite arbitrary files on the target system.

Systems with SELinux enabled and with sudo built with SELinux support are affected.

Qualys, Inc. reported this vulnerability.

Impact:   A local user can overwrite arbitrary files with root privileges on the target system.
Solution:   McAfee has issued a fix for CVE-2017-1000368 for McAfee Web Gateway (7.6.2.15, 7.7.2.3).

[Editor's note: The vendor states that default installations that do not have a local shell user are not affected.]

The McAfee advisory is available at:

https://kc.mcafee.com/corporate/index?page=content&id=SB10205

Vendor URL:  kc.mcafee.com/corporate/index?page=content&id=SB10205 (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   This archive entry is a follow-up to the message listed below.
May 30 2017 Sudo get_process_ttyname() Command Validation Flaw Lets Local Users Obtain Root Privileges



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC