CVE-2016-4445

CWE-77Command Injection6 documents5 sources
Severity
7.0HIGH
EPSS
0.1%
top 78.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11
Latest updateMay 17

Description

The fix_lookup_id function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3wff-jp8x-6p8q: The fix_lookup_id function in sealert in setroubleshoot before 32022-05-17
CVEList
CVE-2016-4445: The fix_lookup_id function in sealert in setroubleshoot before 32017-04-11

📋Vendor Advisories

2
Red Hat
setroubleshoot: insecure use of commands.getstatusoutput in sealert2016-06-21
Red Hat
setroubleshoot: command injection issues2016-06-21

💬Community

1
Bugzilla
CVE-2016-4445 setroubleshoot: insecure use of commands.getstatusoutput in sealert2016-05-24