A Local Privilege Escalation Vulnerability in MagniComp's Sysinfo before 10-H64 for Linux and UNIX platforms could allow a local attacker to gain elevated privileges. Parts of SysInfo require setuid-to-root access in order to access restricted system files and make restricted kernel calls. This access could be exploited by a local attacker to gain a root shell prompt using the right combination of environment variables and command line arguments.
References
Link | Resource |
---|---|
http://www.magnicomp.com/support/cve/CVE-2017-6516.shtml | Third Party Advisory |
http://www.securityfocus.com/bid/96934 | Third Party Advisory VDB Entry |
https://labs.mwrinfosecurity.com/advisories/multiple-vulnerabilities-in-magnicomps-sysinfo-root-setuid/ | Third Party Advisory |
https://labs.mwrinfosecurity.com/advisories/magnicomps-sysinfo-root-setuid-local-privilege-escalation-vulnerability/ | Third Party Advisory |
https://www.exploit-db.com/exploits/44150/ |
Configurations
Information
Published : 2017-03-14 10:59
Updated : 2019-10-02 17:03
NVD link : CVE-2017-6516
Mitre link : CVE-2017-6516
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
magnicomp
- sysinfo