Vulnerability Details : CVE-2018-19044
Potential exploit
keepalived 2.0.8 didn't check for pathnames with symlinks when writing data to a temporary file upon a call to PrintData or PrintStats. This allowed local users to overwrite arbitrary files if fs.protected_symlinks is set to 0, as demonstrated by a symlink from /tmp/keepalived.data or /tmp/keepalived.stats to /etc/passwd.
Products affected by CVE-2018-19044
- cpe:2.3:a:keepalived:keepalived:2.0.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-19044
0.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-19044
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:N/I:P/A:P |
3.4
|
4.9
|
NIST | |
4.7
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N |
1.0
|
3.6
|
NIST |
CWE ids for CVE-2018-19044
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-19044
-
https://security.gentoo.org/glsa/201903-01
Keepalived: Multiple vulnerabilities (GLSA 201903-01) — Gentoo securityThird Party Advisory
-
https://github.com/acassen/keepalived/issues/1048
Dbus interface allows overwriting arbitrary files and insecure permissions are used · Issue #1048 · acassen/keepalived · GitHubExploit;Patch;Third Party Advisory
-
https://bugzilla.suse.com/show_bug.cgi?id=1015141
Bug 1015141 – VUL-0: CVE-2018-19044,CVE-2018-19045,CVE-2018-19046, CVE-2018-19115: keepalived: dbus support in keepalivedIssue Tracking;Third Party Advisory
-
https://github.com/acassen/keepalived/commit/04f2d32871bb3b11d7dc024039952f2fe2750306
When opening files for write, ensure they aren't symbolic links · acassen/keepalived@04f2d32 · GitHubPatch;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2019:2285
RHSA-2019:2285 - Security Advisory - Red Hat Customer Portal
Jump to