SB2018050216 - Gentoo update for hesiod



SB2018050216 - Gentoo update for hesiod

Published: May 2, 2018

Security Bulletin ID SB2018050216
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Configuration error (CVE-ID: CVE-2016-10151)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists in the hesiod_init function in lib/hesiod.c due to comparing EUID with UID to determine whether to use configurations from environment variables. A local attacker can gain root privileges via the (1) HESIOD_CONFIG or (2) HES_DOMAIN environment variable and leveraging certain SUID/SGUID binary.

2) Configuration error (CVE-ID: CVE-2016-10152)

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists in the read_config_file function in lib/hesiod. due to falling back to the ".athena.mit.edu" default domain when opening the configuration file fails. A remote attacker can poison the DNS cache and gain root privileges.

Remediation

Install update from vendor's website.