First published: Tue Jul 13 2004(Updated: )
Rule Set Based Access Control (RSBAC) 1.2.2 through 1.2.3 allows access to sys_creat, sys_open, and sys_mknod inside jails, which could allow local users to gain elevated privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rsbac | =1.2.2 | |
Rsbac | =1.2.3 | |
Gentoo Linux | =1.4 | |
RSBAC (Rule Set Based Access Control) | =1.2.2 | |
RSBAC (Rule Set Based Access Control) | =1.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0667 is considered a high severity vulnerability due to the potential for local users to gain elevated privileges.
To mitigate CVE-2004-0667, it is recommended to upgrade RSBAC to versions 1.2.4 or later where this vulnerability is addressed.
CVE-2004-0667 affects RSBAC versions 1.2.2 and 1.2.3, along with specific implementations on Gentoo Linux version 1.4.
Due to CVE-2004-0667, local users can invoke sys_creat, sys_open, and sys_mknod calls inside jails, potentially allowing privilege escalation.
CVE-2004-0667 was reported by security experts observing vulnerabilities in the RSBAC system's access controls.