An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the PatrolAgent SUID binary could allow an attacker with "patrol" privileges to elevate his/her privileges to the ones of the "root" user by specially crafting a shared library .so file that will be loaded during execution.
References
Link | Resource |
---|---|
https://docs.bmc.com/docs/PATROLAgent/11302/notification-of-action-required-by-patrol-agent-users-to-apply-the-security-patch-898411558.html | Patch Vendor Advisory |
https://twitter.com/whira_wr | Third Party Advisory |
https://github.com/blogresponder/BMC-Patrol-Agent-local-root-privilege-escalation | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-10-14 10:15
Updated : 2019-10-18 07:17
NVD link : CVE-2019-17044
Mitre link : CVE-2019-17044
JSON object : View
CWE
CWE-276
Incorrect Default Permissions
Products Affected
bmc
- patrol_agent
linux
- linux_kernel