Lucene search

K
amazonAmazonALAS-2018-1057
HistoryAug 09, 2018 - 4:13 p.m.

Important: yum-utils

2018-08-0916:13:00
alas.aws.amazon.com
496

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.0%

Issue Overview:

A directory traversal issue was found in reposync, a part of yum-utils, where reposync fails to sanitize paths in remote repository configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. If reposync is running with heightened privileges on a targeted system, this flaw could potentially result in system compromise via the overwriting of critical system files.(CVE-2018-10897)

Affected Packages:

yum-utils

Issue Correction:
Run yum update yum-utils to update your system.

New Packages:

noarch:  
    yum-updateonboot-1.1.31-46.30.amzn1.noarch  
    yum-plugin-ps-1.1.31-46.30.amzn1.noarch  
    yum-plugin-rpm-warm-cache-1.1.31-46.30.amzn1.noarch  
    yum-plugin-tmprepo-1.1.31-46.30.amzn1.noarch  
    yum-plugin-ovl-1.1.31-46.30.amzn1.noarch  
    yum-plugin-fastestmirror-1.1.31-46.30.amzn1.noarch  
    yum-plugin-auto-update-debug-info-1.1.31-46.30.amzn1.noarch  
    yum-plugin-filter-data-1.1.31-46.30.amzn1.noarch  
    yum-plugin-versionlock-1.1.31-46.30.amzn1.noarch  
    yum-plugin-remove-with-leaves-1.1.31-46.30.amzn1.noarch  
    yum-plugin-pre-transaction-actions-1.1.31-46.30.amzn1.noarch  
    yum-plugin-show-leaves-1.1.31-46.30.amzn1.noarch  
    yum-plugin-tsflags-1.1.31-46.30.amzn1.noarch  
    yum-utils-1.1.31-46.30.amzn1.noarch  
    yum-plugin-local-1.1.31-46.30.amzn1.noarch  
    yum-plugin-upgrade-helper-1.1.31-46.30.amzn1.noarch  
    yum-plugin-refresh-updatesd-1.1.31-46.30.amzn1.noarch  
    yum-plugin-changelog-1.1.31-46.30.amzn1.noarch  
    yum-plugin-protectbase-1.1.31-46.30.amzn1.noarch  
    yum-plugin-copr-1.1.31-46.30.amzn1.noarch  
    yum-plugin-aliases-1.1.31-46.30.amzn1.noarch  
    yum-plugin-merge-conf-1.1.31-46.30.amzn1.noarch  
    yum-plugin-keys-1.1.31-46.30.amzn1.noarch  
    yum-plugin-post-transaction-actions-1.1.31-46.30.amzn1.noarch  
    yum-plugin-priorities-1.1.31-46.30.amzn1.noarch  
    yum-plugin-verify-1.1.31-46.30.amzn1.noarch  
    yum-plugin-puppetverify-1.1.31-46.30.amzn1.noarch  
    yum-plugin-list-data-1.1.31-46.30.amzn1.noarch  
    yum-NetworkManager-dispatcher-1.1.31-46.30.amzn1.noarch  
    yum-plugin-fs-snapshot-1.1.31-46.30.amzn1.noarch  
  
src:  
    yum-utils-1.1.31-46.30.amzn1.src  

Additional References

Red Hat: CVE-2018-10897

Mitre: CVE-2018-10897

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.0%