Scientific Linux Security Update : setroubleshoot and setroubleshoot-plugins on SL7.x x86_64

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

The setroubleshoot-plugins package provides a set of analysis plugins
for use with setroubleshoot. Each plugin has the capacity to analyze
SELinux AVC data and system data to provide user friendly reports
describing how to interpret SELinux AVC denials.

Security Fix(es) :

- Shell command injection flaws were found in the way the
setroubleshoot executed external commands. A local
attacker able to trigger certain SELinux denials could
use these flaws to execute arbitrary code with
privileges of the setroubleshoot user. (CVE-2016-4989)

- Shell command injection flaws were found in the way the
setroubleshoot allow_execmod and allow_execstack plugins
executed external commands. A local attacker able to
trigger an execmod or execstack SELinux denial could use
these flaws to execute arbitrary code with privileges of
the setroubleshoot user. (CVE-2016-4444, CVE-2016-4446)

The CVE-2016-4444 and CVE-2016-4446 issues were discovered by Milos
Malik (Red Hat) and the CVE-2016-4989 issue was discovered by Red Hat
Product Security.

Note: On Scientific Linux 7.0 and 7.1, the setroubleshoot is run with
root privileges. Therefore, these issues could allow an attacker to
execute arbitrary code with root privileges.

See also :

http://www.nessus.org/u?ad0a8be1

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 91809 ()

Bugtraq ID:

CVE ID: CVE-2016-4444
CVE-2016-4446
CVE-2016-4989

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now