Input validation error in arpwatch - CVE-2012-2653

 

Input validation error in arpwatch - CVE-2012-2653

Published: July 12, 2012 / Updated: August 4, 2020


Vulnerability identifier: #VU33951
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2012-2653
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: LBNL\'s Network Research Group
Affected software:
arpwatch

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon.


How to mitigate CVE-2012-2653

Install update from vendor's website.

Sources