CVE-2016-4444
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
11/04/2017
Last modified:
20/04/2025
Description
The allow_execmod plugin for setroubleshoot before 3.2.23 allows local users to execute arbitrary commands by triggering an execmod SELinux denial with a crafted binary filename, related to the commands.getstatusoutput function.
Impact
Base Score 3.x
7.00
Severity 3.x
HIGH
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:setroubleshoot_project:setroubleshoot:*:*:*:*:*:*:*:* | 3.2.22 (including) | |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://seclists.org/oss-sec/2016/q2/575
- http://www.securityfocus.com/bid/91476
- http://www.securitytracker.com/id/1036144
- https://access.redhat.com/errata/RHSA-2016:1293
- https://bugzilla.redhat.com/show_bug.cgi?id=1332644
- https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5
- https://rhn.redhat.com/errata/RHSA-2016-1267.html
- http://seclists.org/oss-sec/2016/q2/575
- http://www.securityfocus.com/bid/91476
- http://www.securitytracker.com/id/1036144
- https://access.redhat.com/errata/RHSA-2016:1293
- https://bugzilla.redhat.com/show_bug.cgi?id=1332644
- https://github.com/fedora-selinux/setroubleshoot/commit/5cd60033ea7f5bdf8c19c27b23ea2d773d9b09f5
- https://rhn.redhat.com/errata/RHSA-2016-1267.html