An issue was discovered in BMC Patrol Agent 9.0.10i. Weak execution permissions on the PatrolAgent SUID binary could allow an attacker with "patrol" privileges to elevate his/her privileges to the ones of the "root" user by specially crafting a shared library .so file that will be loaded during execution.
References
Link | Resource |
---|---|
https://docs.bmc.com/docs/PATROLAgent/11302/notification-of-action-required-by-patrol-agent-users-to-apply-the-security-patch-898411558.html | Patch Vendor Advisory |
https://github.com/blogresponder/BMC-Patrol-Agent-local-root-privilege-escalation | Third Party Advisory |
https://twitter.com/whira_wr | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-10-14T16:47:06
Updated: 2019-10-14T16:47:06
Reserved: 2019-09-30T00:00:00
Link: CVE-2019-17044
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-10-14T17:15:09.660
Modified: 2019-10-18T14:17:17.423
Link: CVE-2019-17044
JSON object: View
Redhat Information
No data.
CWE