First published: Wed Feb 15 2012(Updated: )
Multiple untrusted search path vulnerabilities in Red Hat Enterprise Virtualization Manager (RHEV-M) before 3.1, when adding a host, allow local users to gain privileges via a Trojan horse (1) deployUtil.py or (2) vds_bootstrap.py Python module in /tmp/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Virtualization Manager | <=3.0 | |
Red Hat Enterprise Virtualization Manager | =2.1 | |
Red Hat Enterprise Virtualization Manager | =2.2 | |
Red Hat Enterprise Virtualization Manager | =2.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0860 has a high severity rating due to its potential to allow local users to gain elevated privileges.
To fix CVE-2012-0860, upgrade Red Hat Enterprise Virtualization Manager to version 3.1 or later.
Versions before 3.1, as well as versions 2.1, 2.2, and 2.2.3 of Red Hat Enterprise Virtualization Manager, are affected by CVE-2012-0860.
CVE-2012-0860 is characterized as an untrusted search path vulnerability in the Red Hat Enterprise Virtualization Manager.
No, CVE-2012-0860 requires local access to the system for exploitation.