Arbitrary code execution - CVE-2016-6402
Published: September 16, 2016
Vulnerability identifier: #VU483
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-6402
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vendor:
Affected software:
Detailed vulnerability description
The vulnerability allows a local authenticated user to get root privileges and cause arbitrary code execution.
The weakness exists due to insufficient checking of user's input at the command-line interface. Using specially crafted CLI by a privileged user leads to improper input validation and arbitary code execution.
Successful exploitation of the vulnerability allows a local user to gain elevated preveleges and trigger arbitrary code execution.
The weakness exists due to insufficient checking of user's input at the command-line interface. Using specially crafted CLI by a privileged user leads to improper input validation and arbitary code execution.
Successful exploitation of the vulnerability allows a local user to gain elevated preveleges and trigger arbitrary code execution.
How to mitigate CVE-2016-6402
Cybersecurity Help is currently unaware of any official patch, which addresses this vulnerability.