Bug 1660263 (CVE-2019-3805) - CVE-2019-3805 wildfly: Race condition on PID file allows for termination of arbitrary processes by local users
Summary: CVE-2019-3805 wildfly: Race condition on PID file allows for termination of a...
Status: CLOSED ERRATA
Alias: CVE-2019-3805
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=moderate,public=20190430:1712,...
Keywords: Security
Depends On:
Blocks: 1645008
TreeView+ depends on / blocked
 
Reported: 2018-12-18 01:01 UTC by Sam Fowler
Modified: 2019-07-19 05:23 UTC (History)
84 users (show)

(edit)
A flaw was discovered in wildfly that would allow local users, who are able to execute init.d script, to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.
Clone Of:
(edit)
Last Closed: 2019-06-10 10:44:03 UTC


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2019:1106 None None None 2019-05-08 12:04 UTC
Red Hat Product Errata RHSA-2019:1107 None None None 2019-05-08 12:09 UTC
Red Hat Product Errata RHSA-2019:1108 None None None 2019-05-08 12:11 UTC
Red Hat Product Errata RHSA-2019:1140 None None None 2019-05-09 18:14 UTC

Description Sam Fowler 2018-12-18 01:01:07 UTC
JBoss EAP has a vulnerability that allows local users who are able to execute init.d script to terminate arbitrary process on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.

Comment 5 Chess Hazlett 2019-04-30 17:35:00 UTC
Acknowledgments:

Name: Daniel Le Gall (SCRT Information Security)

Comment 6 errata-xmlrpc 2019-05-08 12:04:12 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2019:1106 https://access.redhat.com/errata/RHSA-2019:1106

Comment 7 errata-xmlrpc 2019-05-08 12:09:15 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 6

Via RHSA-2019:1107 https://access.redhat.com/errata/RHSA-2019:1107

Comment 8 errata-xmlrpc 2019-05-08 12:11:37 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.2 for RHEL 7

Via RHSA-2019:1108 https://access.redhat.com/errata/RHSA-2019:1108

Comment 9 errata-xmlrpc 2019-05-09 18:14:54 UTC
This issue has been addressed in the following products:

  Red Hat Single Sign-On 7.3.1 zip

Via RHSA-2019:1140 https://access.redhat.com/errata/RHSA-2019:1140

Comment 10 Joshua Padman 2019-05-15 22:53:18 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Fuse 6
 * Red Hat JBoss Fuse Service Works 6
 * Red Hat JBoss Data Virtualization & Services 6

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 12 Paramvir jindal 2019-07-19 05:22:28 UTC
JDG 7.3.2 (latest version as of today) is affected. Creating Tracker.


Note You need to log in before you can comment on or make changes to this bug.