First published: Fri Mar 26 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. To exploit the vulnerability, the ehealth user must create a malicious library in the writable RPATH, to be dynamically linked when the FtpCollector executable is run. The code in the library will be executed as the root user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CA eHealth Performance Manager | <=6.3.2.12 | |
<=6.3.2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28249 has been classified as a privilege escalation vulnerability.
To mitigate CVE-2021-28249, ensure that users do not have write access to the RPATH directory.
CVE-2021-28249 affects CA eHealth Performance Manager versions up to 6.3.2.12.
CVE-2021-28249 is a privilege escalation vulnerability that can be exploited via a malicious dynamically linked shared object.
The ehealth user is at risk of CVE-2021-28249 if they can create a malicious library in the writable RPATH.