CVE-2016-9638

In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bmc:patrol:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:01

Type Values Removed Values Added
References () http://www.nes.fr/securitylab/index.php/2016/12/02/privilege-escalation-on-bmc-patrol - Exploit, Patch, Third Party Advisory () http://www.nes.fr/securitylab/index.php/2016/12/02/privilege-escalation-on-bmc-patrol - Exploit, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/95009 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/95009 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1037385 - () http://www.securitytracker.com/id/1037385 -

Information

Published : 2016-12-02 17:59

Updated : 2024-11-21 03:01


NVD link : CVE-2016-9638

Mitre link : CVE-2016-9638

CVE.ORG link : CVE-2016-9638


JSON object : View

Products Affected

bmc

  • patrol
CWE
CWE-264

Permissions, Privileges, and Access Controls