An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the PatrolAgent SUID binary could allow an attacker with "patrol" privileges to elevate his/her privileges to the ones of the "root" user by specially crafting a shared library .so file that will be loaded during execution.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
https://twitter.com/whira_wr | third party advisory |
https://github.com/blogresponder/BMC-Patrol-Agent-local-root-privilege-escalation | third party advisory |
https://docs.bmc.com/docs/PATROLAgent/11302/notification-of-action-required-by-patrol-agent-users-to-apply-the-security-patch-898411558.html | patch vendor advisory |