First published: Mon Jan 17 2022(Updated: )
AIDE before 0.17.4 allows local users to obtain root privileges via crafted file metadata (such as XFS extended attributes or tmpfs ACLs), because of a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/aide | <0:0.14-11.el6_10.1 | 0:0.14-11.el6_10.1 |
redhat/aide | <0:0.15.1-13.el7_9.1 | 0:0.15.1-13.el7_9.1 |
redhat/aide | <0:0.16-14.el8_5.1 | 0:0.16-14.el8_5.1 |
redhat/aide | <0:0.16-11.el8_1.1 | 0:0.16-11.el8_1.1 |
redhat/aide | <0:0.16-11.el8_2.1 | 0:0.16-11.el8_2.1 |
redhat/aide | <0:0.16-14.el8_4.1 | 0:0.16-14.el8_4.1 |
redhat/redhat-virtualization-host | <0:4.3.22-20220330.1.el7_9 | 0:4.3.22-20220330.1.el7_9 |
debian/aide | 0.16.1-1+deb10u1 0.17.3-4+deb11u2 0.17.3-4+deb11u1 0.18.3-1+deb12u2 0.18.6-2 | |
redhat/aide | <0.17.4 | 0.17.4 |
advanced intrusion detection environment project advanced intrusion detection environment | >=0.13<=0.17.3 | |
redhat ovirt-node | =4.4.10 | |
redhat virtualization host | =4.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =35 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =21.04 | |
Ubuntu | =21.10 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this AIDE vulnerability is CVE-2021-45417.
The severity of CVE-2021-45417 is high with a severity value of 7.
An attacker can exploit this vulnerability by using crafted file metadata to cause a heap-based buffer overflow in the base64 functions of AIDE.
The potential impact of this vulnerability is that an attacker could crash the program and potentially execute arbitrary code.
To fix CVE-2021-45417, you should update AIDE to version 0.17.4 or apply the appropriate remedy provided by your software vendor.