First published: Fri Dec 02 2016(Updated: )
In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BMC Patrol | <=9.13.10.01 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9638 has a medium severity rating due to its potential for local privilege escalation.
To fix CVE-2016-9638, remove the setuid bit from the listguests64 binary or upgrade to a patched version of BMC Patrol.
CVE-2016-9638 affects users of BMC Patrol versions prior to 9.13.10.02.
Exploiting CVE-2016-9638 allows local users to execute arbitrary commands with root privileges.
CVE-2016-9638 is not a zero-day vulnerability as it was publicly disclosed and has patches available.