Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 772514 - (CVE-2012-0032) CVE-2012-0032 JON CLI: world-writable root directory
CVE-2012-0032 JON CLI: world-writable root directory
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
impact=low,public=20120320,reported=2...
: Security
Depends On:
Blocks: 772515 804887
  Show dependency treegraph
 
Reported: 2012-01-08 20:03 EST by David Jorm
Modified: 2014-10-20 20:01 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-03-20 13:34:18 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0406 normal SHIPPED_LIVE Important: JBoss Operations Network 3.0.1 update 2012-03-20 17:08:42 EDT

  None (edit)
Description David Jorm 2012-01-08 20:03:35 EST
After installing the remote client from JON 3.0, the extracted root directory is world readable/writeable/executable (0777). Although the child directories are not world writeable, by the parent directory being left in a world writeable state, it is possible to modify directory and file attributes on the child contents to trick the user into executing malicious scripts or code. A local attacker could use this flaw to compromise a remote JON server, using the credentials stolen from a privileged JON user who is using the remote client CLI from a system the local attacker has access to.
Comment 2 errata-xmlrpc 2012-03-20 13:09:25 EDT
This issue has been addressed in following products:

  JBoss Operations Network 3.0.1

Via RHSA-2012:0406 https://rhn.redhat.com/errata/RHSA-2012-0406.html

Note You need to log in before you can comment on or make changes to this bug.