2.1 CVE-2012-4453
Patch Malware Risk (MITRE)
dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.
https://nvd.nist.gov/vuln/detail/CVE-2012-4453
Categories
CWE-276 : Incorrect Default Permissions
During installation, installed file permissions are set to allow anyone to modify those files. The architecture needs to access and modification attributes for files to only those users who actually require those actions. Executables installed world-writable. Home directories installed world-readable. World-writable log files allow information loss; world-readable file has cleartext passwords. World-readable directory. Windows product uses insecure permissions when installing on Solaris (genesis: port error). Insecure permissions for a shared secret key file. Overlaps cryptographic problem. Default permissions of a device allow IP spoofing.
References
BID
55713 Third Party Advisory VDB Entry |
CONFIRM Patch
https://bugzilla.redhat.com/show_bug.cgi?id=859448 Issue Tracking Patch Third Party Advisory |
MISC
REDHAT
RHSA-2013:1674 Third Party Advisory |
XF
dracut-initramfs-information-disclosure(79258) Third Party Advisory VDB Entry |
_MLIST
[oss-security] 20120927 Re: dracut creates non-world readable initramfs images Mailing List Third Party Advisory |
[oss-security] 20120927 Re: dracut creates world readable initramfs images Mailing List Third Party Advisory |
[oss-security] 20120927 dracut creates non-world readable initramfs images Mailing List Third Party Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:dracut_project:dracut:*:*:*:*:*:*:*:* | < 024 | |
Configuration 2 | ||
cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:* | ||
Configuration 3 | ||
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* |
REMEDIATION
Patch
Url |
---|
https://bugzilla.redhat.com/show_bug.cgi?id=859448 |
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
Other (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
1 | Accessing Functionality Not Properly Constrained by ACLs |
High |
127 | Directory Indexing |
Medium |
81 | Web Server Logs Tampering |
High |
MITRE
Techniques
id | description |
---|---|
T1083 | File and Directory Discovery |
T1574.010 | Hijack Execution Flow: ServicesFile Permissions Weakness |
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
Mitigations
id | description |
---|---|
T1574.010 | Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service binary target path locations. Deny execution from user directories such as file download directories and temp directories where able. |
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. |
Sherlock® flash
Take a picture of your computer network in a few clicks !
The Sherlock® flash audit solution allows you to perform an audit to strengthen the security of your IT assets. Vulnerability analysis of your physical and virtual equipment. Patch planning by priority level and time available. Detailed and intuitive reporting.
