Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-24489 CVE-2021-25217 CVE-2021-27219 |
CWE-ID | CWE-459 CWE-20 CWE-190 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
redhat-virtualization-host (Red Hat package) Operating systems & Components / Operating system package or component redhat-release-virtualization-host (Red Hat package) Operating systems & Components / Operating system package or component Red Hat Virtualization Host Web applications / Remote management & hosting panels Red Hat Virtualization Server applications / Virtualization software |
Vendor | Red Hat Inc. |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU54191
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-24489
CWE-ID:
CWE-459 - Incomplete cleanup
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incomplete cleanup, which leads to security restrictions bypass and privilege escalation.
MitigationInstall updates from vendor's website.
redhat-virtualization-host (Red Hat package): 4.3.11-20200922.0.el7_9 - 4.3.14-20210322.0.el7_9
redhat-release-virtualization-host (Red Hat package): 4.3.4-1.el7ev - 4.3.14-2.el7ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3https://access.redhat.com/errata/RHSA-2021:2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU53609
Risk: Medium
CVSSv4.0: 1.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-25217
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack or gain access to sensitive information.
The vulnerability exists due to insufficient validation of options data stored in DHCP leases. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack or gain access to sensitive information.
Both dhcpd and dhclient are affected by the vulnerability.
Install updates from vendor's website.
redhat-virtualization-host (Red Hat package): 4.3.11-20200922.0.el7_9 - 4.3.14-20210322.0.el7_9
redhat-release-virtualization-host (Red Hat package): 4.3.4-1.el7ev - 4.3.14-2.el7ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3https://access.redhat.com/errata/RHSA-2021:2519
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51456
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-27219
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow within the g_bytes_new() function on 64-bit platforms due to an implicit cast from 64 bits to 32 bits. A local user can run a specially crafted program to trigger an integer overflow and execute arbitrary code with elevated privileges.
Install updates from vendor's website.
redhat-virtualization-host (Red Hat package): 4.3.11-20200922.0.el7_9 - 4.3.14-20210322.0.el7_9
redhat-release-virtualization-host (Red Hat package): 4.3.4-1.el7ev - 4.3.14-2.el7ev
Red Hat Virtualization Host: 4
Red Hat Virtualization: 4
CPE2.3https://access.redhat.com/errata/RHSA-2021:2519
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.