First published: Tue Oct 07 2014(Updated: )
/opt/vyatta/bin/sudo-users/vyatta-clear-dhcp-lease.pl on the Brocade Vyatta 5400 vRouter 6.4R(x), 6.6R(x), and 6.7R1 does not properly validate parameters, which allows local users to gain privileges by leveraging the sudo configuration.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Brocade Vyatta 5400 vRouter | =6.4 | |
Brocade Vyatta 5400 vRouter | =6.6 | |
Brocade Vyatta 5400 vRouter | =6.7 | |
Brocade Vyatta vRouter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4870 has a CVSS score indicating a medium severity vulnerability due to improper parameter validation allowing privilege escalation.
To fix CVE-2014-4870, update the Brocade Vyatta 5400 vRouter software to a patched version that addresses the improper validation.
CVE-2014-4870 affects local users of the Brocade Vyatta 5400 vRouter versions 6.4, 6.6, and 6.7.
CVE-2014-4870 is exploitable locally as it requires authenticated access to the affected system.
Attackers can gain elevated privileges on the system due to the vulnerable parameter validation in the sudo configuration.