Vulnerability identifier: #VU39199
Vulnerability risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-19
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Fedora
Operating systems & Components /
Operating system
Vendor: Fedoraproject
Description
The vulnerability allows a local authenticated user to read and manipulate data.
modules/chef.py in SaltStack before 2014.7.4 does not properly handle files in /tmp.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Fedora: 23
External links
https://lists.fedoraproject.org/pipermail/package-announce/2016-January/175568.html
https://bugzilla.redhat.com/show_bug.cgi?id=1212788
https://docs.saltstack.com/en/latest/topics/releases/2014.7.4.html
https://github.com/saltstack/salt/commit/22d2f7a1ec93300c34e8c42d14ec39d51e610b5c
https://github.com/saltstack/salt/commit/b49d0d4b5ca5c6f31f03e2caf97cef1088eeed81
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.