multipathd授权绕过漏洞(CVE-2022-41974)

admin 2023-11-30 05:25:49 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 multipathd授权绕过漏洞(CVE-2022-41974)

CVE编号

CVE-2022-41974

利用情况

POC 已公开

补丁情况

没有补丁

披露时间

2022-10-27
漏洞描述
该漏洞源于 multipathd 守护进程在抽象的 Unix 套接字上侦听客户端连接。
解决建议
厂商已发布安全更新版本:https://github.com/opensvc/multipath-tools
参考链接
http://packetstormsecurity.com/files/169611/Leeloo-Multipath-Authorization-By...
http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_...
http://seclists.org/fulldisclosure/2022/Dec/4
http://seclists.org/fulldisclosure/2022/Oct/25
http://www.openwall.com/lists/oss-security/2022/10/24/2
http://www.openwall.com/lists/oss-security/2022/11/30/2
https://access.redhat.com/security/cve/cve-2022-41974
https://bugzilla.suse.com/show_bug.cgi?id=1202739
https://github.com/opensvc/multipath-tools/releases/tag/0.9.2
https://lists.debian.org/debian-lts-announce/2022/12/msg00037.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedora...
https://security.gentoo.org/glsa/202311-06
https://vigilance.fr/vulnerability/multipath-tools-two-vulnerabilities-39707
https://www.debian.org/security/2023/dsa-5366
https://www.qualys.com/2022/10/24/leeloo-multipath/leeloo-multipath.txt
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 opensvc multipath-tools * From (including) 0.7.0 Up to (excluding) 0.9.2
运行在以下环境
系统 alibaba_cloud_linux_2.1903 device-mapper-multipath-sysvinit * Up to (excluding) 0.4.9-136.1.al7
运行在以下环境
系统 amazon_2 device-mapper-multipath * Up to (excluding) 0.4.9-136.amzn2
运行在以下环境
系统 amazon_2023 device-mapper-multipath * Up to (excluding) 0.8.7-16.amzn2023.0.2
运行在以下环境
系统 anolis_os_7 device-mapper-multipath-libs * Up to (excluding) 0.4.9-136
运行在以下环境
系统 anolis_os_8 kpartx * Up to (excluding) 0.8.4-22.0.1
运行在以下环境
系统 centos_7 device-mapper-multipath * Up to (excluding) 0.4.9-136.el7_9
运行在以下环境
系统 centos_8 device-mapper-multipath-debuginfo * Up to (excluding) 0.8.4-22.el8_6.2
运行在以下环境
系统 debian_10 multipath-tools * Up to (excluding) 0.7.9-3+deb10u2
运行在以下环境
系统 debian_11 multipath-tools * Up to (excluding) 0.8.5-2+deb11u1
运行在以下环境
系统 debian_12 multipath-tools * Up to (excluding) 0.9.4-1
运行在以下环境
系统 debian_sid multipath-tools * Up to (excluding) 0.9.4-1
运行在以下环境
系统 fedora_36 kpartx-debuginfo * Up to (excluding) 0.8.7-9.fc36
运行在以下环境
系统 kylinos_aarch64_V10 device-mapper-multipath * Up to (excluding) 0.4.9-136.el7_9
运行在以下环境
系统 kylinos_aarch64_V10SP1 kpartx * Up to (excluding) 0.8.4-6.p03.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 kpartx * Up to (excluding) 0.8.4-6.p03.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 kpartx * Up to (excluding) 0.8.4-18.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 kpartx * Up to (excluding) 0.8.4-6.p03.a.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 kpartx * Up to (excluding) 0.8.4-18.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10 device-mapper-multipath * Up to (excluding) 0.4.9-136.el7_9
运行在以下环境
系统 kylinos_x86_64_V10SP1 kpartx * Up to (excluding) 0.8.4-6.p03.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 kpartx * Up to (excluding) 0.8.4-6.p03.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 kpartx * Up to (excluding) 0.8.4-18.ky10
运行在以下环境
系统 opensuse_5.2 +126+suse.8ce8da5 * Up to (excluding) 0.8.5
运行在以下环境
系统 opensuse_Leap_15.3 multipath-tools-rbd * Up to (excluding) 0.8.5
运行在以下环境
系统 opensuse_Leap_15.4 multipath-tools-rbd * Up to (excluding) 150400.4.7.1
运行在以下环境
系统 oracle_7 oraclelinux-release * Up to (excluding) 0.4.9-136.0.1.el7_9
运行在以下环境
系统 oracle_8 oraclelinux-release * Up to (excluding) 0.8.4-22.el8_6.2
运行在以下环境
系统 oracle_9 oraclelinux-release * Up to (excluding) 0.8.7-7.el9_0.1
运行在以下环境
系统 redhat_7 device-mapper-multipath * Up to (excluding) 0.4.9-136.el7_9
运行在以下环境
系统 redhat_8 device-mapper-multipath-debuginfo * Up to (excluding) 0.8.4-22.el8_6.2
运行在以下环境
系统 redhat_9 device-mapper-multipath-libs * Up to (excluding) 0.8.7-7.el9_0.1
运行在以下环境
系统 suse_12_SP5 kpartx * Up to (excluding) 0.7.9
运行在以下环境
系统 ubuntu_18.04 multipath-tools * Up to (excluding) 0.7.4-2ubuntu3.2
运行在以下环境
系统 ubuntu_20.04 multipath-tools * Up to (excluding) 0.8.3-1ubuntu2.1
运行在以下环境
系统 ubuntu_22.04 multipath-tools * Up to (excluding) 0.8.8-1ubuntu1.22.04.1
运行在以下环境
系统 ubuntu_22.10 multipath-tools * Up to (excluding) 0.8.8-1ubuntu1.22.10.1
运行在以下环境
系统 unionos_a device-mapper-multipath * Up to (excluding) device-mapper-multipath-0.8.4-22.uelc20.3
运行在以下环境
系统 unionos_e multipath-tools * Up to (excluding) 0.8.4-17.up1.uel20
阿里云评分 4.5
  • 攻击路径 远程
  • 攻击复杂度 复杂
  • 权限要求 无需权限
  • 影响范围 有限影响
  • EXP成熟度 POC 已公开
  • 补丁情况 没有补丁
  • 数据保密性 数据泄露
  • 数据完整性 无影响
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-269 特权管理不恰当
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  1