Lucene search

K
gentooGentoo FoundationGLSA-201607-16
HistoryJul 20, 2016 - 12:00 a.m.

arpwatch: Privilege escalation

2016-07-2000:00:00
Gentoo Foundation
security.gentoo.org
12

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.011 Low

EPSS

Percentile

84.6%

Background

The ethernet monitor program; for keeping track of ethernet/ip address pairings.

Description

Arpwatch does not properly drop supplementary groups.

Impact

Attackers, if able to exploit arpwatch, could escalate privileges outside of the running process.

Workaround

There is no known workaround at this time.

Resolution

All arpwatch users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --verbose --oneshot ">=net-analyzer/arpwatch-2.1.15-r8"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-analyzer/arpwatch< 2.1.15-r8UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.011 Low

EPSS

Percentile

84.6%