Bug 491621
| Summary: | ucd-snmp / net-snmp: snmpd runs with privileges of privileged user | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED NOTABUG | QA Contact: | |
| Severity: | low | Docs Contact: | |
| Priority: | low | ||
| Version: | unspecified | CC: | jsafrane |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520724 | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2009-05-27 13:57:52 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ I don't think this should be tracked as security flaw. snmpd is run as root by default, as root privileges are required to obtain certain information served to SNMP clients by the daemon. This default can be overridden by -u / -g command line arguments, which specify UID / GID under which snmpd should be run. snmpd init script in Red Hat Enterprise Linux 4 and later allows specifying snmpd's command line options in sysconfig file without a need to modify init script itself - /etc/sysconfig/snmpd.options on Red Hat Enterprise Linux 4 and 5, /etc/sysconfig/snmpd on current Fedora versions. |
A security flaw was found in ucd-snmp / net-snmp package. The snmpd daemon used to run with user / group privileges of a privileged user (root). An attacker could use this flaw for potential privilege escalation. Note: Successful exploitation of this flaw / privilege escalation would require that additional (highly unprobable) requirements are simultaneously met.