First published: Fri Jun 17 2016(Updated: )
SolarWinds Virtualization Manager 6.3.1 and earlier allow local users to gain privileges by leveraging a misconfiguration of sudo, as demonstrated by "sudo cat /etc/passwd."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SolarWinds Virtualization Manager | <=6.3.1 | |
SolarWinds Virtualization Manager | ||
<=6.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3643 has a moderate severity rating due to the potential for privilege escalation.
To fix CVE-2016-3643, ensure proper configuration of the sudoers file and restrict access appropriately.
CVE-2016-3643 affects users of SolarWinds Virtualization Manager versions 6.3.1 and earlier.
CVE-2016-3643 is a local privilege escalation vulnerability resulting from a misconfiguration of sudo.
No, CVE-2016-3643 requires local access to the system for exploitation.