CNVD-2018-06094
Vulnerability from cnvd - Published: 2018-03-23
VLAI Severity ?
Title
多款EMC产品权限提升漏洞
Description
EMC RSA Identity Governance and Lifecycle、RSA Via Lifecycle and Governance和RSA Identity Management and Governance都是美国易安信(EMC)公司的产品。EMC RSA Identity Governance and Lifecycle是一套生命周期管理解决方案;EMC RSA Identity Management and Governance(IMG)是一套企业级身份识别和管理解决方案;EMC RSA Via Lifecycle&Governance是一套生命周期管理和身份识别解决方案。
多款EMC产品中存在提权漏洞。攻击者可利用该漏洞以root权限执行任意脚本。
Severity
高
Patch Name
多款EMC产品权限提升漏洞的补丁
Patch Description
EMC RSA Identity Governance and Lifecycle、RSA Via Lifecycle and Governance和RSA Identity Management and Governance都是美国易安信(EMC)公司的产品。EMC RSA Identity Governance and Lifecycle是一套生命周期管理解决方案;EMC RSA Identity Management and Governance(IMG)是一套企业级身份识别和管理解决方案;EMC RSA Via Lifecycle&Governance是一套生命周期管理和身份识别解决方案。
多款EMC产品中存在提权漏洞。攻击者可利用该漏洞以root权限执行任意脚本。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: https://www.emc.com
Reference
http://seclists.org/fulldisclosure/2018/Mar/16
Impacted products
| Name | ['EMC RSA Via Lifecycle and Governance 7.0', 'EMC RSA Identity Governance and Lifecycle 7.0.1', 'EMC RSA Identity Governance and Lifecycle 7.0.2', 'EMC RSA Identity Management & Governance 6.9.1', 'EMC RSA Identity Management & Governance 6.9'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "103317"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-1182"
}
},
"description": "EMC RSA Identity Governance and Lifecycle\u3001RSA Via Lifecycle and Governance\u548cRSA Identity Management and Governance\u90fd\u662f\u7f8e\u56fd\u6613\u5b89\u4fe1\uff08EMC\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002EMC RSA Identity Governance and Lifecycle\u662f\u4e00\u5957\u751f\u547d\u5468\u671f\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bEMC RSA Identity Management and Governance\uff08IMG\uff09\u662f\u4e00\u5957\u4f01\u4e1a\u7ea7\u8eab\u4efd\u8bc6\u522b\u548c\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bEMC RSA Via Lifecycle\u0026Governance\u662f\u4e00\u5957\u751f\u547d\u5468\u671f\u7ba1\u7406\u548c\u8eab\u4efd\u8bc6\u522b\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\n\u591a\u6b3eEMC\u4ea7\u54c1\u4e2d\u5b58\u5728\u63d0\u6743\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5root\u6743\u9650\u6267\u884c\u4efb\u610f\u811a\u672c\u3002",
"discovererName": "EMC",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttps://www.emc.com",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-06094",
"openTime": "2018-03-23",
"patchDescription": "EMC RSA Identity Governance and Lifecycle\u3001RSA Via Lifecycle and Governance\u548cRSA Identity Management and Governance\u90fd\u662f\u7f8e\u56fd\u6613\u5b89\u4fe1\uff08EMC\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002EMC RSA Identity Governance and Lifecycle\u662f\u4e00\u5957\u751f\u547d\u5468\u671f\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bEMC RSA Identity Management and Governance\uff08IMG\uff09\u662f\u4e00\u5957\u4f01\u4e1a\u7ea7\u8eab\u4efd\u8bc6\u522b\u548c\u7ba1\u7406\u89e3\u51b3\u65b9\u6848\uff1bEMC RSA Via Lifecycle\u0026Governance\u662f\u4e00\u5957\u751f\u547d\u5468\u671f\u7ba1\u7406\u548c\u8eab\u4efd\u8bc6\u522b\u89e3\u51b3\u65b9\u6848\u3002\r\n\r\n\u591a\u6b3eEMC\u4ea7\u54c1\u4e2d\u5b58\u5728\u63d0\u6743\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5root\u6743\u9650\u6267\u884c\u4efb\u610f\u811a\u672c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eEMC\u4ea7\u54c1\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"EMC RSA Via Lifecycle and Governance 7.0",
"EMC RSA Identity Governance and Lifecycle 7.0.1",
"EMC RSA Identity Governance and Lifecycle 7.0.2",
"EMC RSA Identity Management \u0026 Governance 6.9.1",
"EMC RSA Identity Management \u0026 Governance 6.9"
]
},
"referenceLink": "http://seclists.org/fulldisclosure/2018/Mar/16",
"serverity": "\u9ad8",
"submitTime": "2018-03-12",
"title": "\u591a\u6b3eEMC\u4ea7\u54c1\u6743\u9650\u63d0\u5347\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…