search menu icon-carat-right cmu-wordmark

CERT Coordination Center

LabTech contains privilege escalation vulnerability

Vulnerability Note VU#637068

Original Release Date: 2015-01-23 | Last Revised: 2015-01-29

Overview

LabTech startup scripts and directories on Linux platforms are world-writeable and the scripts execute with root privileges.

Description

CWE-284: Improper Access Control

LabTech startup scripts and directories on Linux platforms are world-writeable and the scripts execute with root privileges.

Impact

A local, authenticated attacker may be able to gain root access to the system.

Solution

Apply an Update

This issue has been fixed in Labtech versions 100.237 and above, which is currently in beta at the time of this writing. Customers who wish to acquire this version must sign up for Labtech's Beta program. Customers who are not able to upgrade or acquire version 100.237 of the software should consider the following workaround:

Remove world-writable access

Users who are unable to upgrade can manually remove world-writable permissions to the Labtech directories and startups scripts in order to mitigate this vulnerability.

Vendor Information

637068
 

LabTech Software Affected

Updated:  January 20, 2015

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C
Temporal 5.8 E:POC/RL:U/RC:UR
Environmental 5.8 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Iwan Boskamp for reporting this vulnerability.

This document was written by Todd Lewellen.

Other Information

CVE IDs: CVE-2015-0926
Date Public: 2015-01-23
Date First Published: 2015-01-23
Date Last Updated: 2015-01-29 14:31 UTC
Document Revision: 24

Sponsored by CISA.