- Description
- Dell EMC iDRAC Service Module for all supported Linux and XenServer versions v3.0.1, v3.0.2, v3.1.0, v3.2.0, when started, changes the default file permission of the hosts file of the host operating system (/etc/hosts) to world writable. A malicious low privileged operating system user or process could modify the host file and potentially redirect traffic from the intended destination to sites hosting malicious or unwanted content.
- Source
- security_alert@emc.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 6.6
- Impact score
- 5.3
- Exploitability score
- 0.8
- Vector string
- CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 2.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:N/I:P/A:N
- nvd@nist.gov
- CWE-732
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dell:emc_idrac_service_module:3.0.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "61FA8A18-C839-49C4-8050-099A55C5D498"
},
{
"criteria": "cpe:2.3:a:dell:emc_idrac_service_module:3.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E2055E74-38B9-4644-AF50-8416519AAB59"
},
{
"criteria": "cpe:2.3:a:dell:emc_idrac_service_module:3.1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F4F997EF-B3DB-4A63-8352-D425EB37186D"
},
{
"criteria": "cpe:2.3:a:dell:emc_idrac_service_module:3.2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "427082ED-AFC1-4D82-9F9D-AC056706D3AE"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B5647AEA-DCE6-4950-A7EB-05465ECDDE16"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.9:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "39A7795D-CFD3-4643-A7A1-7AD7629B5511"
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.4:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "041F9200-4C01-4187-AE34-240E8277B54D"
},
{
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "41E76620-EC14-4D2B-828F-53F26DEA5DDC"
},
{
"criteria": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "CEF98D6C-3C80-4A42-B14B-22D69BC1F4C2"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]