Lucene search

K
gentooGentoo FoundationGLSA-201805-01
HistoryMay 02, 2018 - 12:00 a.m.

hesiod: Root privilege escalation

2018-05-0200:00:00
Gentoo Foundation
security.gentoo.org
199

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.0%

Background

DNS functionality to access to DB of information that changes infrequently.

Description

Multiple vulnerabilities have been discovered in hesiod that have remained unaddressed. Please review the referenced CVE identifiers for details.

Impact

A remote or local attacker may be able to escalate privileges to root.

Workaround

There is no known workaround at this time.

Resolution

Gentoo has discontinued support for hesiod and recommends that users unmerge the package:

 # emerge --unmerge "net-dns/hesiod"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-dns/hesiod<= 3.1.0UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.005 Low

EPSS

Percentile

76.0%