SB2016072021 - Gentoo update for arpwatch
Published: July 20, 2016 Updated: September 25, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2012-2653)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.
Remediation
Install update from vendor's website.