A Local Privilege Escalation Vulnerability in MagniComp's Sysinfo before 10-H64 for Linux and UNIX platforms could allow a local attacker to gain elevated privileges. Parts of SysInfo require setuid-to-root access in order to access restricted system files and make restricted kernel calls. This access could be exploited by a local attacker to gain a root shell prompt using the right combination of environment variables and command line arguments.
References
Link | Resource |
---|---|
http://www.magnicomp.com/support/cve/CVE-2017-6516.shtml | Third Party Advisory |
http://www.securityfocus.com/bid/96934 | Third Party Advisory VDB Entry |
https://labs.mwrinfosecurity.com/advisories/magnicomps-sysinfo-root-setuid-local-privilege-escalation-vulnerability/ | Third Party Advisory |
https://labs.mwrinfosecurity.com/advisories/multiple-vulnerabilities-in-magnicomps-sysinfo-root-setuid/ | Third Party Advisory |
https://www.exploit-db.com/exploits/44150/ |
Configurations
History
No history.
Information
Published : 2017-03-14 17:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-6516
Mitre link : CVE-2017-6516
CVE.ORG link : CVE-2017-6516
JSON object : View
Products Affected
magnicomp
- sysinfo
CWE
CWE-20
Improper Input Validation