In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1037385 | vdb entry |
http://www.nes.fr/securitylab/index.php/2016/12/02/privilege-escalation-on-bmc-patrol | patch third party advisory exploit |
http://www.securityfocus.com/bid/95009 | third party advisory vdb entry |