Vulnerability CVE-2016-10152


Published: 2017-03-28

Description:
The read_config_file function in lib/hesiod.c in Hesiod 3.2.1 falls back to the ".athena.mit.edu" default domain when opening the configuration file fails, which allows remote attackers to gain root privileges by poisoning the DNS cache.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Hesiod project -> Hesiod 

 References:
http://www.openwall.com/lists/oss-security/2017/01/21/1
http://www.securityfocus.com/bid/90952
https://bugzilla.redhat.com/show_bug.cgi?id=1332493
https://github.com/achernya/hesiod/pull/10
https://security.gentoo.org/glsa/201805-01

Copyright 2024, cxsecurity.com

 

Back to Top