Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2019-14287 CVE-2018-12207 |
CWE-ID | CWE-264 CWE-119 |
Exploitation vector | Local network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Red Hat OpenShift Container Platform Client/Desktop applications / Software for system administration |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU21782
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2019-14287
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists in the implementation of the "sudo" application when processing commands that are configured to run with ALL keyword. A local user with privileges to use sudo for specific applications on the system can escalate privileges and run the application as root (even if precisely restricted), if user id "-1" or "4294967295" is used.
Example:
The following entry instructs sudo to allow user bob to run "/usr/bin/id" command as any user on the system but root:
myhost bob = (ALL, !root) /usr/bin/id
The following command will allow bob execute the "/usr/bin/id" command as root:
sudo -u#-1 id -uMitigation
Install updates from vendor's website.
Red Hat OpenShift Container Platform: 4.2.0 - 4.2.4
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2019:3916
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU22712
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2018-12207
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform denial of service (DoS) attack.
The vulnerability exists due to a boundary error in the mechanism responsible for error handling on some Intel platforms. A local user of a guest operating system can use a specially crafted application to trigger memory corruption and cause the host system to stop responding.
Successful exploitation of this vulnerability may result in a denial of service (DoS) attack.
Below is the list of processor families that are affected by this vulnerability:
Client:
Server:
Install updates from vendor's website.
Red Hat OpenShift Container Platform: 4.2.0 - 4.2.4
CPE2.3 External linkshttp://access.redhat.com/errata/RHSA-2019:3916
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?