First published: Tue Jun 26 2018(Updated: )
Dell EMC iDRAC Service Module for all supported Linux and XenServer versions v3.0.1, v3.0.2, v3.1.0, v3.2.0, when started, changes the default file permission of the hosts file of the host operating system (/etc/hosts) to world writable. A malicious low privileged operating system user or process could modify the host file and potentially redirect traffic from the intended destination to sites hosting malicious or unwanted content.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC iDRAC Service Module | =3.0.1 | |
Dell EMC iDRAC Service Module | =3.0.2 | |
Dell EMC iDRAC Service Module | =3.1.0 | |
Dell EMC iDRAC Service Module | =3.2.0 | |
Citrix XenServer | =7.1 | |
Redhat Enterprise Linux | =6.9 | |
Redhat Enterprise Linux | =7.4 | |
SUSE SUSE Linux Enterprise Server | =11-sp4 | |
SUSE SUSE Linux Enterprise Server | =12-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11053 is a vulnerability in the Dell EMC iDRAC Service Module for Linux and XenServer that allows a low privileged user to change the default file permissions of the hosts file to world writable.
The affected versions of Dell EMC iDRAC Service Module are v3.0.1, v3.0.2, v3.1.0, and v3.2.0.
The severity of CVE-2018-11053 is medium (6.5).
A malicious low privileged user or process can exploit this vulnerability to modify the hosts file and potentially gain unauthorized access to the host operating system.
No, Citrix XenServer and Redhat Enterprise Linux are not affected by CVE-2018-11053.