Bug 1003877 - (CVE-2016-5425) CVE-2016-5425: Apache Tomcat packaging: Root Privilege Escalation local privilege escalation via systemd-tmpfiles service (RH-based only)
(CVE-2016-5425)
CVE-2016-5425: Apache Tomcat packaging: Root Privilege Escalation local privi...
Status: RESOLVED INVALID
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 42.1
Other Other
: P5 - None : Normal (vote)
: ---
Assigned To: Security Team bot
E-mail List
CVSSv2:RedHat:CVE-2016-5425:6.9:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2016-10-10 09:53 UTC by Mikhail Kasimov
Modified: 2016-10-10 14:06 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Mikhail Kasimov 2016-10-10 09:53:11 UTC
References:
===========================================================
[1] http://seclists.org/oss-sec/2016/q4/78
[2] http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
[3] https://access.redhat.com/security/cve/CVE-2016-5425
===========================================================

[1]:
===========================================================
Vulnerability: Apache Tomcat packaging on RedHat-based distros

CVE-2016-5425

Discovered by:
Dawid Golunski (http://legalhackers.com)

Affected systems: Multiple Tomcat packages on RedHat-based systems
including: CentOS,Fedora,OracleLinux,RedHat etc.

Short Description:

Apache Tomcat packages provided by default repositories of RedHat-based
distributions (including CentOS, RedHat, OracleLinux, Fedora,  etc.)
create a tmpfiles.d configuration file with insecure permissions which
allow attackers who are able to write files with tomcat user permissions
(for example, through a vulnerability in web application hosted on Tomcat)
to escalate their privileges from tomcat user to root and fully compromise
the target system.

Full advisory and a working root privilege escalation exploit can be found
at:

http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html


BTW. If you are using Tomcat on a Debian-based distro,  you may want
to check out
my previous Tomcat advisory and exploit at:

http://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html

-- 
Regards,
Dawid Golunski
http://legalhackers.com
===========================================================
Comment 1 Johannes Segitz 2016-10-10 14:06:16 UTC
not a problem for our packages