Improper access control in Red Hat Satellite - CVE-2016-9595
Published: February 27, 2018 / Updated: March 27, 2018
Vulnerability identifier: #VU10759
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2016-9595
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor: Red Hat Inc.
Affected software:
Red Hat Satellite
Red Hat Satellite
Detailed vulnerability description
The vulnerability allows a local attacker to launch a symlink attack on the target system.
The weakness exists in the katello-debug due to insecure usage of temporary files by certain scripts and log files. A local attacker can create a symbolic link from a temporary file to various files on the system, bypass local access protections to overwrite the contents of arbitrary files.
The weakness exists in the katello-debug due to insecure usage of temporary files by certain scripts and log files. A local attacker can create a symbolic link from a temporary file to various files on the system, bypass local access protections to overwrite the contents of arbitrary files.
How to mitigate CVE-2016-9595
Update to version 6.3.