4581 lines
205 KiB
Text
4581 lines
205 KiB
Text
<!DOCTYPE html>
|
||
|
||
<html lang="en">
|
||
<head>
|
||
|
||
|
||
|
||
<title>NVD - CVE-2021-4034</title>
|
||
|
||
<meta http-equiv="content-type" content="text/html; charset=UTF-8" />
|
||
<meta http-equiv="content-style-type" content="text/css" />
|
||
<meta http-equiv="content-script-type" content="text/javascript" />
|
||
<meta name="viewport" content="width=device-width, initial-scale=1.0" />
|
||
|
||
|
||
<link href="/site-scripts/font-awesome/css/font-awesome.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link href="/site-media/bootstrap/css/bootstrap-theme.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
<link
|
||
href="/site-scripts/eonasdan-bootstrap-datetimepicker/build/css/bootstrap-datetimepicker.min.css"
|
||
type="text/css" rel="stylesheet" />
|
||
|
||
|
||
<link href="/site-media/css/nist-fonts.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/base-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/css/media-resize.css" type="text/css"
|
||
rel="stylesheet" />
|
||
|
||
|
||
<meta name="theme-color" content="#000000">
|
||
|
||
|
||
<script src="/site-scripts/jquery/dist/jquery.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/jquery-visible/jquery.visible.min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/underscore/underscore-min.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/bootstrap/js/bootstrap.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-scripts/moment/min/moment.min.js"
|
||
type="text/javascript"></script>
|
||
<script
|
||
src="/site-scripts/eonasdan-bootstrap-datetimepicker/build/js/bootstrap-datetimepicker.min.js"
|
||
type="text/javascript"></script>
|
||
|
||
|
||
<script src="/site-media/js/megamenu.js" type="text/javascript"></script>
|
||
<script src="/site-media/js/nist-exit-script.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/forms.js" type="text/javascript"></script>
|
||
|
||
<script
|
||
src="/site-media/js/federated-analytics.all.min.js?agency=NIST&subagency=nvd&pua=UA-37115410-41&yt=true"
|
||
type="text/javascript" id="_fed_an_js_tag"></script>
|
||
|
||
<!-- Google tag (gtag.js) -->
|
||
<script async src="https://www.googletagmanager.com/gtag/js?id=G-4KKFZP12LQ"></script>
|
||
<script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-4KKFZP12LQ'); </script>
|
||
|
||
|
||
<style id="antiClickjack">
|
||
body>* {
|
||
display: none !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: block !important;
|
||
}
|
||
</style>
|
||
<noscript>
|
||
<style id="antiClickjackNoScript">
|
||
body>* {
|
||
display: block !important;
|
||
}
|
||
|
||
#antiClickjack {
|
||
display: none !important;
|
||
}
|
||
</style>
|
||
</noscript>
|
||
<script type="text/javascript" id="antiClickjackScript">
|
||
if (self === top) {
|
||
// no clickjacking
|
||
var antiClickjack = document.getElementById("antiClickjack");
|
||
antiClickjack.parentNode.removeChild(antiClickjack);
|
||
} else {
|
||
setTimeout(tryForward(), 5000);
|
||
}
|
||
|
||
function tryForward() {
|
||
top.location = self.location;
|
||
}
|
||
</script>
|
||
<meta charset="UTF-8">
|
||
|
||
<link href="/site-media/css/nvd-style.css" type="text/css"
|
||
rel="stylesheet" />
|
||
<link href="/site-media/images/favicons/apple-touch-icon.png"
|
||
rel="apple-touch-icon" type="image/png" sizes="180x180" />
|
||
<link href="/site-media/images/favicons/favicon-32x32.png"
|
||
rel="icon" type="image/png" sizes="32x32" />
|
||
<link href="/site-media/images/favicons/favicon-16x16.png"
|
||
rel="icon" type="image/png" sizes="16x16" />
|
||
<link href="/site-media/images/favicons/manifest.json"
|
||
rel="manifest" />
|
||
<link href="/site-media/images/favicons/safari-pinned-tab.svg"
|
||
rel="mask-icon" color="#000000" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" />
|
||
<meta name="msapplication-config" content="/site-media/images/favicons/browserconfig.xml" />
|
||
<link href="/site-media/images/favicons/favicon.ico"
|
||
rel="shortcut icon" type="image/x-icon" />
|
||
<link href="/site-media/images/favicons/favicon.ico" rel="icon"
|
||
type="image/x-icon" />
|
||
<meta charset="UTF-8">
|
||
<script src="/site-media/js/vulnerability/vulnDetail.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/cvssVulnDetail.js"
|
||
type="text/javascript"></script>
|
||
|
||
</head>
|
||
<body>
|
||
<header role="banner" title="Site Banner">
|
||
<div id="antiClickjack" style="display: none">
|
||
<h1>You are viewing this page in an unauthorized frame window.</h1>
|
||
<p>
|
||
This is a potential security issue, you are being redirected to
|
||
<a href="https://nvd.nist.gov">https://nvd.nist.gov</a>
|
||
</p>
|
||
</div>
|
||
<div>
|
||
<section class="usa-banner" aria-label="Official government website">
|
||
<div class="usa-accordion container">
|
||
<header class="usa-banner__header">
|
||
<noscript>
|
||
<p style="font-size: 0.85rem; font-weight: bold;">You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.</p>
|
||
</noscript>
|
||
<img class="usa-banner__header-flag"
|
||
src="/site-media/images/usbanner/us_flag_small.png" alt="U.S. flag">
|
||
|
||
<span class="usa-banner__header-text">An official website of the United States government</span>
|
||
|
||
<button id="gov-banner-button" class="usa-accordion__button usa-banner__button" data-toggle="collapse" data-target="#gov-banner" aria-expanded="false" aria-controls="gov-banner">
|
||
<span class="usa-banner__button-text">Here's how you know</span>
|
||
</button>
|
||
</header>
|
||
<div class="usa-banner__content usa-accordion__content collapse" role="tabpanel" id="gov-banner" aria-expanded="true">
|
||
<div class="row">
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-dot-gov.svg" alt="Dot gov">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Official websites use .gov</strong>
|
||
<br>
|
||
A <strong>.gov</strong> website belongs to an official government organization in the United States.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-md-5 col-sm-12">
|
||
<div class="row">
|
||
<div class="col-sm-2 col-xs-3">
|
||
<img class="usa-banner__icon usa-media-block__img"
|
||
src="/site-media/images/usbanner/icon-https.svg" alt="Https">
|
||
</div>
|
||
<div class="col-sm-10 col-xs-9">
|
||
<p>
|
||
<strong>Secure .gov websites use HTTPS</strong>
|
||
<br>
|
||
A <strong>lock</strong> (<img class="usa-banner__lock"
|
||
src="/site-media/images/usbanner/lock.svg" alt="Dot gov">) or <strong>https://</strong> means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
</div>
|
||
<div>
|
||
<div>
|
||
<nav id="navbar" class="navbar">
|
||
<div id="nist-menu-container" class="container">
|
||
<div class="row">
|
||
<!-- Brand -->
|
||
<div class="col-xs-6 col-md-4 navbar-header"
|
||
style="height:104px">
|
||
<a class="navbar-brand"
|
||
href="https://www.nist.gov"
|
||
target="_blank" rel="noopener noreferrer"
|
||
id="navbar-brand-image"
|
||
style="padding-top: 36px">
|
||
|
||
<img alt="National Institute of Standards and Technology"
|
||
src="/site-media/images/nist/nist-logo.svg"
|
||
width="110" height="30">
|
||
</a>
|
||
</div>
|
||
<div class="col-xs-6 col-md-8 navbar-nist-logo">
|
||
<span id="nvd-menu-button" class="pull-right" style="margin-top: 26px"> <a href="#">
|
||
<span class="fa fa-bars"></span> <span id="nvd-menu-full-text"><span
|
||
class="hidden-xxs">NVD </span>MENU</span>
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="main-menu-row container">
|
||
<!-- Collect the nav links, forms, and other content for toggling -->
|
||
<div id="main-menu-drop" class="col-lg-12" style="display: none;">
|
||
<ul>
|
||
|
||
<li><a href="/general"> General <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-general"
|
||
data-expander-name="general" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="general">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/nvd-dashboard">NVD Dashboard</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://www.nist.gov/itl/nvd">News and Status Updates</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/faq">FAQ</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/general/visualizations">Visualizations</a>
|
||
</p>
|
||
<p>
|
||
<a href="/general/legal-disclaimer">Legal Disclaimer</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln"> Vulnerabilities <span
|
||
class="expander fa fa-plus"
|
||
id="nvd-header-menu-vulnerabilities"
|
||
data-expander-name="vulnerabilities" data-expanded="false">
|
||
<span class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="vulnerabilities">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Search & Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/categories">Weakness Types</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/data-feeds">Legacy Data Feeds</a>
|
||
</p>
|
||
<p>
|
||
<a href="/vuln/vendor-comments">Vendor Comments</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/cvmap">CVMAP</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/vuln-metrics/cvss#"> Vulnerability Metrics <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-metrics"
|
||
data-expander-name="metrics" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="metrics">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v4-calculator">CVSS v4.0
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v3-calculator">CVSS v3.x
|
||
Calculators</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln-metrics/cvss/v2-calculator">CVSS v2.0
|
||
Calculator</a>
|
||
</p>
|
||
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
<li><a href="/products"> Products <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-products"
|
||
data-expander-name="products" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="products">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe">CPE Dictionary</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/statistics">CPE Statistics</a>
|
||
</p>
|
||
<p>
|
||
<a href="/products/swid">SWID</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4"></div>
|
||
</div>
|
||
</div></li>
|
||
<li>
|
||
<a href="/developers">Developers<span
|
||
class="expander fa fa-plus" id="nvd-header-menu-developers"
|
||
data-expander-name="developers" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="developers">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/start-here">Start Here</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/request-an-api-key">Request an API Key</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/vulnerabilities">Vulnerabilities</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/products">Products</a>
|
||
</p>
|
||
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/developers/data-sources">Data Sources</a>
|
||
</p>
|
||
<p>
|
||
<a href="/developers/terms-of-use">Terms of Use</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</li>
|
||
<li><a href="/contact"> Contact NVD </a></li>
|
||
<li><a href="/other"> Other Sites <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-othersites"
|
||
data-expander-name="otherSites" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="otherSites">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="https://ncp.nist.gov">Checklist (NCP) Repository</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://ncp.nist.gov/cce">Configurations (CCE)</a>
|
||
</p>
|
||
<p>
|
||
<a href="https://csrc.nist.gov/Projects/risk-management/sp800-53-controls/release-search">800-53 Controls</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/scap-validation-program">SCAP
|
||
Validated Tools</a>
|
||
</p>
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/security-content-automation-protocol">SCAP</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a
|
||
href="https://csrc.nist.gov/projects/united-states-government-configuration-baseline">USGCB</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
<li><a href="/search"> Search <span
|
||
class="expander fa fa-plus" id="nvd-header-menu-search"
|
||
data-expander-name="search" data-expanded="false"> <span
|
||
class="element-invisible">Expand or Collapse</span>
|
||
</span>
|
||
</a>
|
||
<div style="display: none;" class="sub-menu"
|
||
data-expander-trigger="search">
|
||
<div class="row">
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/vuln/search">Vulnerability Search</a>
|
||
</p>
|
||
</div>
|
||
<div class="col-lg-4">
|
||
<p>
|
||
<a href="/products/cpe/search">CPE Search</a>
|
||
</p>
|
||
</div>
|
||
</div>
|
||
</div></li>
|
||
|
||
|
||
|
||
|
||
</ul>
|
||
</div>
|
||
<!-- /#mobile-nav-container -->
|
||
</div>
|
||
|
||
</nav>
|
||
<section id="itl-header" class="has-menu">
|
||
<div class="container">
|
||
<div class="row">
|
||
<div class="col-sm-12 col-md-8">
|
||
<h2 class="hidden-xs hidden-sm">
|
||
<a href="https://www.nist.gov/itl" target="_blank" rel="noopener noreferrer">Information Technology Laboratory</a>
|
||
</h2>
|
||
<h1 class="hidden-xs hidden-sm">
|
||
<a id="nvd-header-link"
|
||
href="/">National Vulnerability Database</a>
|
||
</h1>
|
||
<h1 class="hidden-xs text-center hidden-md hidden-lg"
|
||
>National Vulnerability Database</h1>
|
||
<h1 class="hidden-sm hidden-md hidden-lg text-center"
|
||
>NVD</h1>
|
||
|
||
</div>
|
||
<div class="col-sm-12 col-md-4">
|
||
<a style="width: 100%; text-align: center; display: block;padding-top: 14px">
|
||
<img id="img-logo-nvd-lg"
|
||
alt="National Vulnerability Database"
|
||
src="/site-media/images/F_NIST-Logo-NVD-white.svg"
|
||
width="500" height="100">
|
||
</a>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</section>
|
||
|
||
|
||
</div>
|
||
</div>
|
||
</header>
|
||
<main>
|
||
<div>
|
||
<div id="body-section" class="container">
|
||
<div class="row">
|
||
<ol class="breadcrumb">
|
||
<li><a href="/vuln" class="CMSBreadCrumbsLink">Vulnerabilities</a></li>
|
||
</ol>
|
||
</div>
|
||
<div>
|
||
<style>
|
||
/* wrap the words for CVSS v4 */
|
||
#nistv4Metric {
|
||
word-wrap: break-word;
|
||
}
|
||
</style>
|
||
|
||
<script>
|
||
/*<![CDATA[*/
|
||
var vuln = {
|
||
nistV4Present: false,
|
||
cnaV4Present: false,
|
||
nistV3Present: true,
|
||
cnaV3Present: false,
|
||
nistV2Present: true,
|
||
cnaV2Present: false
|
||
};
|
||
/*]]>*/
|
||
</script>
|
||
|
||
|
||
<div>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
|
||
|
||
<div id="vulnDetailPanel">
|
||
<table id="vulnDetailTableView" style="border-collapse: collapse;">
|
||
<tr>
|
||
<td colspan="2">
|
||
|
||
<h2 data-testid="page-header">
|
||
<i class="fa fa-bug fa-flip-vertical"></i><span
|
||
data-testid="page-header-vuln-id">CVE-2021-4034</span>
|
||
Detail
|
||
</h2>
|
||
|
||
|
||
|
||
<div class="row">
|
||
<div class="col-lg-9 col-md-7 col-sm-12">
|
||
<div id="vulnShowWarningDiv"
|
||
data-testid="vuln-warning-container">
|
||
<div
|
||
role="alert" data-testid="vuln-warning-alert-container" class="bs-callout bs-callout-info">
|
||
<strong class="h4Size"><span
|
||
data-testid="vuln-warning-status-name">Modified</span></strong>
|
||
<hr/>
|
||
<p data-testid="vuln-warning-banner-content">This CVE record has been updated after NVD enrichment efforts were completed. Enrichment data supplied by the NVD may require amendment due to these changes.</p>
|
||
</div>
|
||
</div>
|
||
|
||
<h3 id="vulnDescriptionTitle"
|
||
data-testid="vuln-description-title">Description </h3>
|
||
|
||
<p data-testid="vuln-description">A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When successfully executed the attack can cause a local privilege escalation given unprivileged users administrative rights on the target machine.</p><br/>
|
||
|
||
|
||
|
||
|
||
|
||
<!-- CVSS Severity and Vector Strings -->
|
||
<div id="vulnCvssPanel" data-testid="vuln-cvss-container"
|
||
class="row bs-callout bs-callout-success cvssVulnDetail">
|
||
<h3 style="display: inline" title="CVSS is not a measure of risk">Metrics</h3>
|
||
 
|
||
<div id="cvssVulnDetailBtn" class="btn-group">
|
||
<button id="btn-cvss4" type="button" title="Click here to view CVSS 4.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 4.0
|
||
</button>
|
||
<button id="btn-cvss3" type="button" title="Click here to view CVSS 3.x data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 3.x
|
||
</button>
|
||
<button id="btn-cvss2" type="button" title="Click here to view CVSS 2.0 data"
|
||
class="btn default btn-lg cvssBtn">CVSS Version 2.0
|
||
</button>
|
||
</div>
|
||
|
||
|
||
<div id="cvssEnrichmentNotes">
|
||
<i>
|
||
<small>
|
||
NVD enrichment efforts reference publicly available information to associate
|
||
vector strings. CVSS information contributed by other sources is also
|
||
displayed.
|
||
</small>
|
||
</i>
|
||
</div>
|
||
|
||
<!-- CVSS v4.0 -->
|
||
<div class="container-fluid" id="Vuln4CvssPanel" data-testid="vuln-cvss4-panel">
|
||
<strong>CVSS 4.0 Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss4-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong> </strong><span
|
||
class="severityDetail"> <a
|
||
id="Cvss4NistCalculatorAnchorNA"
|
||
class="label label-default"
|
||
data-testid="vuln-cvss4-panel-score-na">N/A</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
|
||
<span> <span
|
||
data-testid="vuln-cvss4-nist-vector-na">NVD assessment
|
||
not yet provided.</span></span> <input type="hidden"
|
||
id="nistV4MetricHidden"
|
||
value=""/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
|
||
|
||
</div>
|
||
|
||
|
||
<!-- CVSS V3.x -->
|
||
<div class="container-fluid" id="Vuln3CvssPanel" data-testid="vuln-cvss3-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 3.x Severity and Vector Strings:</strong>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<br/>
|
||
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon" alt="NIST CVSS score">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3NistCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-4034&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=NIST"
|
||
data-testid="vuln-cvss3-panel-score"
|
||
class="label label-danger">7.8 HIGH</a>
|
||
</span></span>
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss3-nist-vector"
|
||
class="tooltipCvss3NistMetrics">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span></span>
|
||
<input type="hidden"
|
||
id="nistV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>7.8 </span><span data-testid='vuln-cvssv3-base-score-severity'>HIGH</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 5.9 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 1.8 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> Low </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> High </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
|
||
</div>
|
||
|
||
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
<div class="row no-gutters">
|
||
<div>
|
||
<br/>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>ADP:</strong> <span class="wrapData"
|
||
data-testid="vuln-cvss3-source-adp">CISA-ADP</span>
|
||
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss3AdpCalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v3-calculator?name=CVE-2021-4034&vector=AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H&version=3.1&source=CISA-ADP"
|
||
data-testid="vuln-cvss3-adp-panel-score"
|
||
class="label label-danger">7.8 HIGH</a></span></span>
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong> <span
|
||
data-testid="vuln-cvss3-adp-vector"
|
||
class="tooltipCvss3AdpMetrics">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span></span>
|
||
<input type="hidden" id="adpV3MetricHidden"
|
||
value="<span id = 'nistV3Metric' style = 'display:none' > <strong style ='font-size:1.2em' > CVSS v3.1 Severity and Metrics:</strong> <p data-testid='vuln-cvssv3-score-container'> <strong>Base Score: </strong> <span data-testid='vuln-cvssv3-base-score'>7.8 </span><span data-testid='vuln-cvssv3-base-score-severity'>HIGH</span> <br /> <strong>Vector: </strong> <span data-testid='vuln-cvssv3-vector'> AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H </span> <br /> <strong>Impact Score: </strong> <span data-testid='vuln-cvssv3-impact-score'> 5.9 </span> <br /> <strong>Exploitability Score: </strong> <span data-testid='vuln-cvssv3-exploitability-score'> 1.8 </span> </p> <hr /> <p data-testid='vuln-cvssv3-metrics-container'> <strong>Attack Vector (AV): </strong> <span data-testid='vuln-cvssv3-av'> Local </span> <br /> <strong>Attack Complexity (AC): </strong> <span data-testid='vuln-cvssv3-ac'> Low </span> <br /> <strong>Privileges Required (PR): </strong> <span data-testid='vuln-cvssv3-pr'> Low </span> <br /> <strong>User Interaction (UI): </strong> <span data-testid='vuln-cvssv3-ui'> None </span> <br /> <strong>Scope (S): </strong> <span data-testid='vuln-cvssv3-s'> Unchanged </span> <br /> <strong>Confidentiality (C): </strong> <span data-testid='vuln-cvssv3-c'> High </span> <br /> <strong>Integrity (I): </strong> <span data-testid='vuln-cvssv3-i'> High </span> <br /> <strong>Availability (A): </strong> <span data-testid='vuln-cvssv3-a'> High </span> </p> </span> "/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
|
||
|
||
<!-- <div id="cvss3FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss3FootNoteSection" th:utext="${cvssData.cvss3FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
|
||
<!-- CVSS V2.0 -->
|
||
<div class="container-fluid" id="Vuln2CvssPanel" data-testid="vuln-cvss2-panel"
|
||
style="display: none;">
|
||
<strong>CVSS 2.0 Severity and Vector Strings:</strong> <br/> <br/>
|
||
<!-- NIST -->
|
||
<div class="row no-gutters">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<div class="row">
|
||
<div class="col-lg-3 col-sm-6">
|
||
<img
|
||
src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cvssNvdIcon"
|
||
alt="National Institute of Standards and Technology">
|
||
</div>
|
||
<div class="col-lg-9 col-sm-6">
|
||
<strong>NIST:</strong> <span
|
||
data-testid="vuln-cvss2-source-nvd">NVD</span>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
<div class="col-lg-3 col-sm-6">
|
||
<span><strong>Base
|
||
Score:</strong> <span class="severityDetail"> <a
|
||
id="Cvss2CalculatorAnchor"
|
||
href="/vuln-metrics/cvss/v2-calculator?name=CVE-2021-4034&vector=(AV:L/AC:L/Au:N/C:C/I:C/A:C)&version=2.0&source=NIST" class="label label-danger">7.2 HIGH</a></span></span>
|
||
|
||
|
||
</div>
|
||
<div class="col-lg-6 col-sm-12">
|
||
<span><strong>Vector:</strong>
|
||
<span data-testid="vuln-cvss2-panel-vector"
|
||
class="tooltipCvss2NistMetrics">(AV:L/AC:L/Au:N/C:C/I:C/A:C)</span></span> <input type="hidden"
|
||
id="nistV2MetricHidden"
|
||
value="<span id ='cnaV2Metric' style='display:none'><strong style='font-size:1.2em' >CVSS v2.0 Severity and Metrics:</strong><p data-testid='vuln-cvssv2-score-container'><strong>Base Score: </strong><span data-testid='vuln-cvssv2-base-score'>7.2 </span><span data-testid='vuln-cvssv2-base-score-severity'>HIGH</span><br /><strong>Vector: </strong><span data-testid='vuln-cvssv2-vector'>(AV:L/AC:L/Au:N/C:C/I:C/A:C)</span><br /><strong>Impact Subscore: </strong><span data-testid='vuln-cvssv2-impact-subscore'>10.0</span><br /><strong>Exploitability Subscore: </strong><span data-testid='vuln-cvssv2-exploitability-score'>3.9</span></p><hr /><p data-testid='vuln-cvssv2-metrics-container'><strong>Access Vector (AV): </strong><span data-testid='vuln-cvssv2-av'>Local</span><br /><strong>Access Complexity (AC): </strong><span data-testid='vuln-cvssv2-ac'>Low</span><br /><strong>Authentication (AU): </strong><span data-testid='vuln-cvssv2-au'>None</span><br /><strong>Confidentiality (C): </strong><span data-testid='vuln-cvssv3-c'>Complete</span><br /><strong>Integrity (I): </strong><span data-testid='vuln-cvssv2-i'>Complete</span><br /><strong>Availability (A): </strong><span data-testid='vuln-cvssv2-a'>Complete</span><br /><strong>Additional Information: </strong><br/><span data-testid='vuln-cvssv2-additional'>Allows unauthorized disclosure of information<br/>Allows unauthorized modification<br/>Allows disruption of service<br/></span></p></span>"/>
|
||
</div>
|
||
</div>
|
||
<!-- CNA -->
|
||
|
||
|
||
<!-- ADP -->
|
||
|
||
|
||
<!-- <div id = "cvss2FootNote" class="cvssFootNote" >-->
|
||
<!-- <br/><br/>-->
|
||
<!-- <span id = "cvss2FootNoteSection" th:utext="${cvssData.cvss2FootNoteHtml}"></span>-->
|
||
<!-- </div>-->
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="row col-sm-12">
|
||
|
||
|
||
|
||
<div id="vulnHyperlinksPanel">
|
||
<h3>References to Advisories, Solutions, and Tools</h3>
|
||
<p>
|
||
By selecting these links, you will be leaving NIST webspace.
|
||
We have provided these links to other web sites because they
|
||
may have information that would be of interest to you. No
|
||
inferences should be drawn on account of other sites being
|
||
referenced, or not, from this page. There may be other web
|
||
sites that are more appropriate for your purpose. NIST does
|
||
not necessarily endorse the views expressed, or concur with
|
||
the facts presented on these sites. Further, NIST does not
|
||
endorse any commercial products that may be mentioned on
|
||
these sites. Please address comments about this page to <a
|
||
href="mailto:nvd@nist.gov">nvd@nist.gov</a>.
|
||
</p>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-hyperlinks-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Hyperlink</th>
|
||
<th>Resource</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-0">
|
||
<td data-testid="vuln-hyperlinks-link-0">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-0">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-1">
|
||
<td data-testid="vuln-hyperlinks-link-1">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-1">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-2">
|
||
<td data-testid="vuln-hyperlinks-link-2">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-2">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-3">
|
||
<td data-testid="vuln-hyperlinks-link-3">
|
||
<a
|
||
href="http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html"
|
||
target="_blank" rel="noopener noreferrer">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-3">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span><span>
|
||
<span class="badge">VDB Entry</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-4">
|
||
<td data-testid="vuln-hyperlinks-link-4">
|
||
<a
|
||
href="https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
|
||
target="_blank" rel="noopener noreferrer">https://access.redhat.com/security/vulnerabilities/RHSB-2022-001</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-4">
|
||
<span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-5">
|
||
<td data-testid="vuln-hyperlinks-link-5">
|
||
<a
|
||
href="https://access.redhat.com/security/vulnerabilities/RHSB-2022-001"
|
||
target="_blank" rel="noopener noreferrer">https://access.redhat.com/security/vulnerabilities/RHSB-2022-001</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-5">
|
||
<span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Vendor Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-6">
|
||
<td data-testid="vuln-hyperlinks-link-6">
|
||
<a
|
||
href="https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
|
||
target="_blank" rel="noopener noreferrer">https://bugzilla.redhat.com/show_bug.cgi?id=2025869</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-6">
|
||
<span>
|
||
<span class="badge">Issue Tracking</span>
|
||
</span><span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-7">
|
||
<td data-testid="vuln-hyperlinks-link-7">
|
||
<a
|
||
href="https://bugzilla.redhat.com/show_bug.cgi?id=2025869"
|
||
target="_blank" rel="noopener noreferrer">https://bugzilla.redhat.com/show_bug.cgi?id=2025869</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-7">
|
||
<span>
|
||
<span class="badge">Issue Tracking</span>
|
||
</span><span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-8">
|
||
<td data-testid="vuln-hyperlinks-link-8">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-8">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-9">
|
||
<td data-testid="vuln-hyperlinks-link-9">
|
||
<a
|
||
href="https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf"
|
||
target="_blank" rel="noopener noreferrer">https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-9">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-10">
|
||
<td data-testid="vuln-hyperlinks-link-10">
|
||
<a
|
||
href="https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
|
||
target="_blank" rel="noopener noreferrer">https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-10">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-11">
|
||
<td data-testid="vuln-hyperlinks-link-11">
|
||
<a
|
||
href="https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683"
|
||
target="_blank" rel="noopener noreferrer">https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-11">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-12">
|
||
<td data-testid="vuln-hyperlinks-link-12">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-12">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-13">
|
||
<td data-testid="vuln-hyperlinks-link-13">
|
||
<a
|
||
href="https://www.oracle.com/security-alerts/cpuapr2022.html"
|
||
target="_blank" rel="noopener noreferrer">https://www.oracle.com/security-alerts/cpuapr2022.html</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-13">
|
||
<span>
|
||
<span class="badge">Patch</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-14">
|
||
<td data-testid="vuln-hyperlinks-link-14">
|
||
<a
|
||
href="https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
|
||
target="_blank" rel="noopener noreferrer">https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-14">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-15">
|
||
<td data-testid="vuln-hyperlinks-link-15">
|
||
<a
|
||
href="https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt"
|
||
target="_blank" rel="noopener noreferrer">https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-15">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Mitigation</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-16">
|
||
<td data-testid="vuln-hyperlinks-link-16">
|
||
<a
|
||
href="https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
|
||
target="_blank" rel="noopener noreferrer">https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-16">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-17">
|
||
<td data-testid="vuln-hyperlinks-link-17">
|
||
<a
|
||
href="https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/"
|
||
target="_blank" rel="noopener noreferrer">https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-17">
|
||
<span>
|
||
<span class="badge">Exploit</span>
|
||
</span><span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-18">
|
||
<td data-testid="vuln-hyperlinks-link-18">
|
||
<a
|
||
href="https://www.starwindsoftware.com/security/sw-20220818-0001/"
|
||
target="_blank" rel="noopener noreferrer">https://www.starwindsoftware.com/security/sw-20220818-0001/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-18">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-19">
|
||
<td data-testid="vuln-hyperlinks-link-19">
|
||
<a
|
||
href="https://www.starwindsoftware.com/security/sw-20220818-0001/"
|
||
target="_blank" rel="noopener noreferrer">https://www.starwindsoftware.com/security/sw-20220818-0001/</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-19">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-20">
|
||
<td data-testid="vuln-hyperlinks-link-20">
|
||
<a
|
||
href="https://www.suse.com/support/kb/doc/?id=000020564"
|
||
target="_blank" rel="noopener noreferrer">https://www.suse.com/support/kb/doc/?id=000020564</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-20">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-21">
|
||
<td data-testid="vuln-hyperlinks-link-21">
|
||
<a
|
||
href="https://www.suse.com/support/kb/doc/?id=000020564"
|
||
target="_blank" rel="noopener noreferrer">https://www.suse.com/support/kb/doc/?id=000020564</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-21">
|
||
<span>
|
||
<span class="badge">Third Party Advisory</span>
|
||
</span>
|
||
</td>
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-hyperlinks-row-22">
|
||
<td data-testid="vuln-hyperlinks-link-22">
|
||
<a
|
||
href="https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034"
|
||
target="_blank" rel="noopener noreferrer">https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034</a></td>
|
||
|
||
<td data-testid="vuln-hyperlinks-resType-22">
|
||
|
||
</td>
|
||
</tr>
|
||
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
</div>
|
||
|
||
<div id="vulnCisaExploit">
|
||
<h3>
|
||
This CVE is in CISA's Known Exploited Vulnerabilities Catalog
|
||
</h3>
|
||
<p>
|
||
Reference <a href="https://www.cisa.gov/binding-operational-directive-22-01">
|
||
CISA's BOD 22-01</a> and <a
|
||
href="https://cisa.gov/known-exploited-vulnerabilities-catalog">Known
|
||
Exploited Vulnerabilities Catalog</a> for further guidance and requirements.
|
||
</p>
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Vulnerability Name</th>
|
||
<th>Date Added</th>
|
||
<th>Due Date</th>
|
||
<th>Required Action</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr>
|
||
<td>Red Hat Polkit Out-of-Bounds Read and Write Vulnerability</td>
|
||
<td>06/27/2022</td>
|
||
<td>07/18/2022</td>
|
||
<td>Apply updates per vendor instructions.</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
</div>
|
||
|
||
<div id="vulnTechnicalDetailsDiv" class="technicalDetails"
|
||
data-testid="vuln-technical-details-container">
|
||
<h3>Weakness Enumeration</h3>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-CWEs-table">
|
||
<thead>
|
||
<tr>
|
||
<th>CWE-ID</th>
|
||
<th>CWE Name</th>
|
||
<th>Source</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
<tr data-testid="vuln-CWEs-row-0">
|
||
<td data-testid="vuln-CWEs-link-0">
|
||
<a href="http://cwe.mitre.org/data/definitions/125.html" target="_blank" rel="noopener noreferrer">CWE-125</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-0">Out-of-bounds Read</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-0">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-0-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
<tr data-testid="vuln-CWEs-row-1">
|
||
<td data-testid="vuln-CWEs-link-1">
|
||
<a href="http://cwe.mitre.org/data/definitions/787.html" target="_blank" rel="noopener noreferrer">CWE-787</a>
|
||
|
||
</td>
|
||
<td
|
||
data-testid="vuln-CWEs-link-1">Out-of-bounds Write</td>
|
||
|
||
<td data-testid="vuln-cwes-assigner-1">
|
||
<span class="cweSource" data-testid="vuln-cwes-assigner-1-0"
|
||
>
|
||
<img src="/site-media/images/NVD_NVD_Stack_Plain.svg"
|
||
class="cweNvdIcon"
|
||
alt="cwe source acceptance level">
|
||
|
||
<span>NIST </span>
|
||
</span><span class="cweSource" data-testid="vuln-cwes-assigner-1-1"
|
||
>
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
<span>Red Hat, Inc. </span>
|
||
</span>
|
||
|
||
</td>
|
||
|
||
</tr>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
</div>
|
||
|
||
|
||
<div>
|
||
<h3>
|
||
Known Affected Software Configurations <small> <a
|
||
id="toggleCpeVersion" href="#vulnConfigurationsArea">Switch
|
||
to CPE 2.2</a></small>
|
||
</h3>
|
||
<span id="vulnConfigurationsArea"></span>
|
||
<input type="hidden" id="cveIdHidden" value="CVE-2021-4034"/>
|
||
|
||
<div>
|
||
|
||
<div id="vulnCpeTreeLoading"><h3>CPEs loading, please wait.</h3></div>
|
||
<div id="vulnCpeTree" style="display: none;"></div>
|
||
<input type="hidden"
|
||
id="InputRestBasePath"
|
||
value="/rest/public">
|
||
<input type="hidden" id="cveTreeJsonDataHidden" value="[{"id":1,"dataTestId":"vuln-software-config-1","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-1-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Apolkit_project%3Apolkit%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:polkit_project:polkit","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-1-0-0","id":"15455744","matchCpes":[],"rangeDescription":" versions up to (excluding) 121 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"121","rangeId":"608382","rangeCpes":[]}],"containers":[]}]},{"id":2,"dataTestId":"vuln-software-config-2","totalCpeCount":33,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-2-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aredhat%3Aenterprise_linux_server_update_services_for_sap_solutions%3A7.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-0","id":"15455743","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aredhat%3Aenterprise_linux_server_update_services_for_sap_solutions%3A7.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-1","id":"15455742","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux%3A8.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux:8.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-2","id":"15455723","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_desktop%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_desktop:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-3","id":"15455711","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_eus%3A8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_eus:8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-4","id":"15455726","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_ibm_z_systems%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_ibm_z_systems:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-5","id":"15455718","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_ibm_z_systems%3A8.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_ibm_z_systems:8.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-6","id":"15455739","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_ibm_z_systems_eus%3A8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-7","id":"15455735","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_ibm_z_systems_eus%3A8.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-8","id":"15455738","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_power_big_endian%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_power_big_endian:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-9","id":"15455717","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_power_little_endian%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_power_little_endian:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-10","id":"15455715","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_power_little_endian%3A8.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_power_little_endian:8.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-11","id":"15455737","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_power_little_endian_eus%3A8.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_power_little_endian_eus:8.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-12","id":"15455736","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_power_little_endian_eus%3A8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_power_little_endian_eus:8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-13","id":"15455734","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_power_little_endian_eus%3A8.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_power_little_endian_eus:8.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-14","id":"15455740","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_for_scientific_computing%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_for_scientific_computing:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-15","id":"15455713","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server%3A6.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server:6.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-16","id":"15455716","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-17","id":"15455714","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_aus%3A7.3%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_aus:7.3","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-18","id":"15455719","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_aus%3A7.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_aus:7.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-19","id":"15455720","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_aus%3A7.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_aus:7.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-20","id":"15455722","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_aus%3A7.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_aus:7.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-21","id":"15455724","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_aus%3A8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_aus:8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-22","id":"15455728","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_aus%3A8.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_aus:8.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-23","id":"15455730","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_eus%3A8.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_eus:8.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_eus:8.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-24","id":"15455741","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_tus%3A7.6%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_tus:7.6","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-25","id":"15455721","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_tus%3A7.7%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_tus:7.7","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-26","id":"15455725","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_tus%3A8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_tus:8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-27","id":"15455727","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_tus%3A8.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_tus:8.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-28","id":"15455729","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_update_services_for_sap_solutions%3A8.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-29","id":"15455733","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_update_services_for_sap_solutions%3A8.2%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-30","id":"15455731","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_server_update_services_for_sap_solutions%3A8.4%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-31","id":"15455732","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Aredhat%3Aenterprise_linux_workstation%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:redhat:enterprise_linux_workstation:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-2-0-32","id":"15455712","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":3,"dataTestId":"vuln-software-config-3","totalCpeCount":5,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-3-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A14.04%3A*%3A*%3A*%3Aesm%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:14.04::~~esm~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-0","id":"15455707","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A16.04%3A*%3A*%3A*%3Aesm%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:16.04::~~esm~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-1","id":"15455709","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A18.04%3A*%3A*%3A*%3Alts%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:18.04::~~lts~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-2","id":"15455706","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A20.04%3A*%3A*%3A*%3Alts%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:20.04::~~lts~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-3","id":"15455708","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Acanonical%3Aubuntu_linux%3A21.10%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:canonical:ubuntu_linux:21.10","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-3-0-4","id":"15455710","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":4,"dataTestId":"vuln-software-config-4","totalCpeCount":8,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-4-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asuse%3Aenterprise_storage%3A7.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:suse:enterprise_storage:7.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-0","id":"15455701","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asuse%3Alinux_enterprise_high_performance_computing%3A15.0%3Asp2%3A*%3A*%3A-%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*","cpe22Uri":"cpe:/a:suse:linux_enterprise_high_performance_computing:15.0:sp2:~~-~~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-1","id":"15455703","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asuse%3Amanager_proxy%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:suse:manager_proxy:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-2","id":"15455702","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asuse%3Amanager_server%3A4.1%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:suse:manager_server:4.1","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-3","id":"15455698","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asuse%3Alinux_enterprise_desktop%3A15%3Asp2%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*","cpe22Uri":"cpe:/o:suse:linux_enterprise_desktop:15:sp2","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-4","id":"15455700","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asuse%3Alinux_enterprise_server%3A15%3Asp2%3A*%3A*%3A*%3A-%3A*%3A*","cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*","cpe22Uri":"cpe:/o:suse:linux_enterprise_server:15:sp2:~~~-~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-5","id":"15455704","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asuse%3Alinux_enterprise_server%3A15%3Asp2%3A*%3A*%3A*%3Asap%3A*%3A*","cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*","cpe22Uri":"cpe:/o:suse:linux_enterprise_server:15:sp2:~~~sap~~","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-6","id":"15455705","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asuse%3Alinux_enterprise_workstation_extension%3A12%3Asp5%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:sp5:*:*:*:*:*:*","cpe22Uri":"cpe:/o:suse:linux_enterprise_workstation_extension:12:sp5","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-4-0-7","id":"15455699","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":5,"dataTestId":"vuln-software-config-5","totalCpeCount":3,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-5-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahttp_server%3A12.2.1.3.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:http_server:12.2.1.3.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-0","id":"15455695","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Ahttp_server%3A12.2.1.4.0%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:http_server:12.2.1.4.0","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-1","id":"15455696","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Aoracle%3Azfs_storage_appliance_kit%3A8.8%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:oracle:zfs_storage_appliance_kit:8.8","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-5-0-2","id":"15455697","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]},{"id":6,"dataTestId":"vuln-software-config-6","totalCpeCount":1,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-6-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Asiemens%3Asinumerik_edge%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:siemens:sinumerik_edge:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/a:siemens:sinumerik_edge","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-6-0-0","id":"15455694","matchCpes":[],"rangeDescription":" versions up to (excluding) 3.3.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"3.3.0","rangeId":"521326","rangeCpes":[]}],"containers":[]}]},{"id":7,"dataTestId":"vuln-software-config-7","totalCpeCount":2,"containers":[{"negate":false,"operator":"AND","depth":1,"dataTestId":"vuln-software-operator-7-0","configType":"RUNNING_ON","cpeListType":"NON_VULNERABLE","cpes":[],"containers":[{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-0","configType":"","cpeListType":"NON_VULNERABLE","cpes":[{"depth":3,"vulnerable":false,"previous":false,"urlName":"cpe%3A2.3%3Ah%3Asiemens%3Ascalance_lpe9403%3A-%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*","cpe22Uri":"cpe:/h:siemens:scalance_lpe9403:-","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-0-0","id":"15455692","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]},{"negate":false,"operator":"OR","depth":2,"dataTestId":"vuln-software-operator-7-0-1","configType":"","cpeListType":"VULNERABLE","cpes":[{"depth":3,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Ao%3Asiemens%3Ascalance_lpe9403_firmware%3A*%3A*%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*","cpe22Uri":"cpe:/o:siemens:scalance_lpe9403_firmware","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-7-0-1-0","id":"15455693","matchCpes":[],"rangeDescription":" versions up to (excluding) 2.0 ","rangeStartType":"none","rangeStartVersion":null,"rangeEndType":"excluding","rangeEndVersion":"2.0","rangeId":"515341","rangeCpes":[]}],"containers":[]}]}]},{"id":8,"dataTestId":"vuln-software-config-8","totalCpeCount":2,"containers":[{"negate":false,"operator":"OR","depth":1,"dataTestId":"vuln-software-operator-8-0","configType":"BASIC","cpeListType":"VULNERABLE","cpes":[{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Astarwindsoftware%3Acommand_center%3A1.0%3Aupdate3_build5871%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*","cpe22Uri":"cpe:/a:starwindsoftware:command_center:1.0:update3_build5871","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-0","id":"15455691","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]},{"depth":2,"vulnerable":true,"previous":false,"urlName":"cpe%3A2.3%3Aa%3Astarwindsoftware%3Astarwind_virtual_san%3Av8%3Abuild14338%3A*%3A*%3A*%3A*%3A*%3A*","cpe23Uri":"cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*","cpe22Uri":"cpe:/a:starwindsoftware:starwind_virtual_san:v8:build14338","status":null,"resultingCpes":null,"dataTestId":"vuln-software-cpe-8-0-1","id":"15455690","matchCpes":[],"rangeDescription":"","rangeStartType":"","rangeStartVersion":"","rangeEndType":"","rangeEndVersion":"","rangeId":"","rangeCpes":[]}],"containers":[]}]}]"/>
|
||
|
||
<p id="vulnCpeInfo" >
|
||
<small>
|
||
<i class="fa fa-bug fa-flip-vertical"></i> Denotes Vulnerable Software<br />
|
||
<a href="mailto:cpe_dictionary@nist.gov">Are we missing a CPE here? Please let us know</a>.<br />
|
||
|
||
</small>
|
||
</p>
|
||
<script src="/site-media/js/vulnerability/cpe-match.js"
|
||
type="text/javascript"></script>
|
||
<script src="/site-media/js/vulnerability/configurationListing.js"
|
||
type="text/javascript"></script>
|
||
</div>
|
||
</div>
|
||
|
||
<div id="vulnChangeHistoryDiv"
|
||
data-testid="vuln-change-history-container">
|
||
<h3 id="VulnChangeHistorySection">Change History</h3>
|
||
<small> 22 change records found <a href="#VulnChangeHistorySection"
|
||
style="text-decoration: underline" id="changeHistoryToggle">show
|
||
changes</a>
|
||
</small>
|
||
<div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-0">CVE Modified by CVE</span> <span
|
||
data-testid="vuln-change-history-date-0">11/21/2024 1:36:45 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/security/vulnerabilities/RHSB-2022-001</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=2025869</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.starwindsoftware.com/security/sw-20220818-0001/</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.suse.com/support/kb/doc/?id=000020564</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-0">
|
||
<td
|
||
data-testid="vuln-change-history-0-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-0-type">Reference</td>
|
||
<td data-testid="vuln-change-history-0-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-0-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.vicarius.io/vsociety/posts/pwnkit-pkexec-lpe-cve-2021-4034</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-1">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-1">11/05/2024 2:38:09 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-1">
|
||
<td
|
||
data-testid="vuln-change-history-1-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-1-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-1-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_hyperconverged_appliance:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-1-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-2">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-2">11/05/2024 2:38:14 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-2">
|
||
<td
|
||
data-testid="vuln-change-history-2-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-2-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-2-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_hyperconverged_appliance:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-2-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-3">CVE Modified by CISA-ADP</span> <span
|
||
data-testid="vuln-change-history-date-3">11/04/2024 11:35:01 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-3">
|
||
<td
|
||
data-testid="vuln-change-history-3-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-3-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-3-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-3-new">
|
||
|
||
<pre style="word-break: break-all !important">CISA-ADP AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-4">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-4">6/28/2024 10:14:04 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=2025869 Issue Tracking, Patch, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=2025869 Issue Tracking, Patch</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 Patch</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-4">
|
||
<td
|
||
data-testid="vuln-change-history-4-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-4-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-4-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-4-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/ Exploit, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-5">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-5">5/14/2024 5:47:05 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-6">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-6">11/06/2023 10:40:06 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-6">
|
||
<td
|
||
data-testid="vuln-change-history-6-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-6-type">CWE</td>
|
||
<td data-testid="vuln-change-history-6-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-125</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-6-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-7">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-7">10/17/2023 9:15:25 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-7">
|
||
<td
|
||
data-testid="vuln-change-history-7-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-7-type">Reference</td>
|
||
<td data-testid="vuln-change-history-7-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-7-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.secpod.com/blog/local-privilege-escalation-vulnerability-in-major-linux-distributions-cve-2021-4034/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-8">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-8">9/11/2023 3:45:38 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">CWE</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-125</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-8">
|
||
<td
|
||
data-testid="vuln-change-history-8-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-8-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-8-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-8-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:* versions up to (excluding) 121</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-9">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-9">2/13/2023 4:15:13 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Description</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">CVE-2021-4034 polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-9-showing"
|
||
|
||
>Record truncated, showing 500 of 642 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-4034/change-record?changeRecordedOn=02/13/2023T16:15:13.120-0500">View Entire Change Record</a><br />
|
||
<pre>A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">CWE</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-125</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">CWE</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-787</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0265 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0266 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0267 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0268 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0269 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0270 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0271 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0272 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0273 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0274 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0443 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0540 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-9">
|
||
<td
|
||
data-testid="vuln-change-history-9-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-9-type">Reference</td>
|
||
<td data-testid="vuln-change-history-9-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/security/cve/CVE-2021-4034 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-9-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-10">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-10">2/02/2023 4:21:44 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Description</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
<strong data-testid="vuln-change-history-10-showing"
|
||
>Record truncated, showing 500 of 642 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-4034/change-record?changeRecordedOn=02/02/2023T16:21:44.547-0500">View Entire Change Record</a><br/>
|
||
<pre>A local privilege escalation vulnerability was found on polkit's pkexec utility. The pkexec application is a setuid tool designed to allow unprivileged users to run commands as privileged users according predefined policies. The current version of pkexec doesn't handle the calling parameters count correctly and ends trying to execute environment variables as commands. An attacker can leverage this by crafting environment variables in such a way it'll induce pkexec to execute arbitrary code. When</pre>
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">CVE-2021-4034 polkit: Local privilege escalation in pkexec due to incorrect handling of argument vector</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">CWE</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-125</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">CWE</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-787</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0265 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0266 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0267 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0268 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0269 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0270 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0271 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0272 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0273 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0274 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0443 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/errata/RHSA-2022:0540 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">Reference</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/security/cve/CVE-2021-4034 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-10">
|
||
<td
|
||
data-testid="vuln-change-history-10-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-10-type">CWE Reason</td>
|
||
<td data-testid="vuln-change-history-10-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">CWE-125 / More specific CWE option available</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-10-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-11">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-11">10/25/2022 12:59:09 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-11">
|
||
<td
|
||
data-testid="vuln-change-history-11-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-11-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-11-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-11-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:starwindsoftware:command_center:1.0:update3_build5871:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_hyperconverged_appliance:-:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:starwindsoftware:starwind_virtual_san:v8:build14338:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-11">
|
||
<td
|
||
data-testid="vuln-change-history-11-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-11-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-11-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.starwindsoftware.com/security/sw-20220818-0001/ No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-11-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.starwindsoftware.com/security/sw-20220818-0001/ Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-12">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-12">10/11/2022 7:15:09 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-12">
|
||
<td
|
||
data-testid="vuln-change-history-12-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-12-type">Reference</td>
|
||
<td data-testid="vuln-change-history-12-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-12-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.starwindsoftware.com/security/sw-20220818-0001/ [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-13">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-13">10/05/2022 12:32:41 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">AND
|
||
OR
|
||
*cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:* versions up to (excluding) 2.0
|
||
OR
|
||
cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:siemens:sinumerik_edge:*:*:*:*:*:*:*:* versions up to (excluding) 3.3.0</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-13">
|
||
<td
|
||
data-testid="vuln-change-history-13-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-13-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-13-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-13-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-14">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-14">6/14/2022 6:15:18 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-14">
|
||
<td
|
||
data-testid="vuln-change-history-14-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-14-type">Reference</td>
|
||
<td data-testid="vuln-change-history-14-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-14-new">
|
||
|
||
<pre style="word-break: break-all !important">https://cert-portal.siemens.com/productcert/pdf/ssa-330556.pdf [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-15">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-15">4/19/2022 8:16:34 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-15">
|
||
<td
|
||
data-testid="vuln-change-history-15-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-15-type">Reference</td>
|
||
<td data-testid="vuln-change-history-15-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-15-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.oracle.com/security-alerts/cpuapr2022.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-16">Modified Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-16">4/18/2022 5:58:29 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-16-showing"
|
||
|
||
>Record truncated, showing 500 of 527 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-4034/change-record?changeRecordedOn=04/18/2022T05:58:29.067-0400">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:suse:enterprise_storage:7.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:suse:linux_enterprise_high_performance_computing:15.0:sp2:*:*:-:*:*:*
|
||
*cpe:2.3:a:suse:manager_proxy:4.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:suse:manager_server:4.1:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:suse:linux_enterprise_desktop:15:sp2:*:*:*:*:*:*
|
||
*cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:-:*:*
|
||
*cpe:2.3:o:suse:linux_enterprise_server:15:sp2:*:*:*:sap:*:*
|
||
*cpe:2.3:o:suse:linux_enterprise_workstation_e</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html Exploit, Third Party Advisory, VDB Entry</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.suse.com/support/kb/doc/?id=000020564 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.suse.com/support/kb/doc/?id=000020564 Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-16">
|
||
<td
|
||
data-testid="vuln-change-history-16-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-16-type">Evaluator Description</td>
|
||
<td data-testid="vuln-change-history-16-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Please note that the fix for polkit has been committed to master, but an official release has not been supplied by the maintainers at the time of analysis. This limits the ability of our staff to represent this product through CPE. We advise all users reach out to the organizations responsible for maintaining their package repository to ensure the appropriate version and/or patch of your packages are installed.</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-16-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-17">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-17">4/14/2022 11:15:07 AM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-17">
|
||
<td
|
||
data-testid="vuln-change-history-17-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-17-type">Reference</td>
|
||
<td data-testid="vuln-change-history-17-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-17-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.suse.com/support/kb/doc/?id=000020564 [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-18">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-18">3/04/2022 2:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-18">
|
||
<td
|
||
data-testid="vuln-change-history-18-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-18-type">Reference</td>
|
||
<td data-testid="vuln-change-history-18-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-18-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166200/Polkit-pkexec-Privilege-Escalation.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-19">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-19">3/03/2022 2:15:08 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-19">
|
||
<td
|
||
data-testid="vuln-change-history-19-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-19-type">CWE</td>
|
||
<td data-testid="vuln-change-history-19-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-19-new">
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-125</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-19">
|
||
<td
|
||
data-testid="vuln-change-history-19-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-19-type">CWE</td>
|
||
<td data-testid="vuln-change-history-19-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-19-new">
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-787</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-19">
|
||
<td
|
||
data-testid="vuln-change-history-19-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-19-type">Reference</td>
|
||
<td data-testid="vuln-change-history-19-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-19-new">
|
||
|
||
<pre style="word-break: break-all !important">http://packetstormsecurity.com/files/166196/Polkit-pkexec-Local-Privilege-Escalation.html [No Types Assigned]</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-20">Initial Analysis by NIST</span> <span
|
||
data-testid="vuln-change-history-date-20">1/31/2022 12:50:48 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">CVSS V3.1</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">CVSS V2</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">CWE</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">NIST CWE-787</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:a:polkit_project:polkit:*:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
|
||
<strong data-testid="vuln-change-history-20-showing"
|
||
|
||
>Record truncated, showing 500 of 2538 characters.</strong> <br/>
|
||
|
||
<a href="/vuln/detail/CVE-2021-4034/change-record?changeRecordedOn=01/31/2022T12:50:48.570-0500">View Entire Change Record</a><br />
|
||
<pre>OR
|
||
*cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*
|
||
*cpe:2.3:a:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*
|
||
*cpe:2.3:o:redhat:enterprise_lin</pre>
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">CPE Configuration</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">OR
|
||
*cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
|
||
*cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
|
||
*cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
|
||
*cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
|
||
*cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">https://access.redhat.com/security/vulnerabilities/RHSB-2022-001 Mitigation, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=2025869 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">https://bugzilla.redhat.com/show_bug.cgi?id=2025869 Issue Tracking, Patch, Vendor Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 Patch, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Changed</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">Reference Type</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt No Types Assigned</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt Exploit, Mitigation, Third Party Advisory</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-20">
|
||
<td
|
||
data-testid="vuln-change-history-20-action">Added</td>
|
||
<td
|
||
data-testid="vuln-change-history-20-type">Evaluator Description</td>
|
||
<td data-testid="vuln-change-history-20-old">
|
||
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-20-new">
|
||
|
||
<pre style="word-break: break-all !important">Please note that the fix for polkit has been committed to master, but an official release has not been supplied by the maintainers at the time of analysis. This limits the ability of our staff to represent this product through CPE. We advise all users reach out to the organizations responsible for maintaining their package repository to ensure the appropriate version and/or patch of your packages are installed.</pre>
|
||
<br/>
|
||
|
||
<br />
|
||
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
|
||
<div class="vuln-change-history-container"
|
||
style="display:none">
|
||
|
||
<h4>
|
||
<strong><span
|
||
data-testid="vuln-change-history-type-21">CVE Modified by Red Hat, Inc.</span> <span
|
||
data-testid="vuln-change-history-date-21">1/28/2022 4:15:09 PM</span></strong>
|
||
</h4>
|
||
|
||
|
||
<table
|
||
class="table table-striped table-condensed table-bordered detail-table"
|
||
data-testid="vuln-change-history-table">
|
||
<thead>
|
||
<tr>
|
||
<th>Action</th>
|
||
<th>Type</th>
|
||
<th>Old Value</th>
|
||
<th>New Value</th>
|
||
</tr>
|
||
</thead>
|
||
<tbody>
|
||
<tr data-testid="vuln-change-history-21">
|
||
<td
|
||
data-testid="vuln-change-history-21-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-21-type">CWE</td>
|
||
<td data-testid="vuln-change-history-21-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-125</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-21-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
<tr data-testid="vuln-change-history-21">
|
||
<td
|
||
data-testid="vuln-change-history-21-action">Removed</td>
|
||
<td
|
||
data-testid="vuln-change-history-21-type">CWE</td>
|
||
<td data-testid="vuln-change-history-21-old">
|
||
|
||
|
||
|
||
<pre style="word-break: break-all !important">Red Hat, Inc. CWE-787</pre>
|
||
<br/>
|
||
|
||
<br/>
|
||
|
||
|
||
|
||
|
||
|
||
</td>
|
||
|
||
<td data-testid="vuln-change-history-21-new">
|
||
|
||
|
||
</td>
|
||
</tr>
|
||
</tbody>
|
||
</table>
|
||
|
||
|
||
|
||
</div>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
</div>
|
||
|
||
|
||
<div class="col-lg-3 col-md-5 col-sm-12">
|
||
|
||
<div class="bs-callout bs-callout-info">
|
||
<h4>Quick Info</h4>
|
||
<strong>CVE Dictionary Entry:</strong><br/> <a
|
||
target="_blank" rel="noopener noreferrer" data-testid="vuln-cve-dictionary-entry"
|
||
href="https://cve.org/CVERecord?id=CVE-2021-4034">CVE-2021-4034</a><br/> <strong>NVD
|
||
Published Date:</strong><br/> <span
|
||
data-testid="vuln-published-on">01/28/2022</span><br/> <strong>NVD
|
||
Last Modified:</strong><br/> <span
|
||
data-testid="vuln-last-modified-on">11/21/2024</span><br/> <strong>
|
||
Source:</strong><br/> <span
|
||
data-testid="vuln-current-description-source">Red Hat, Inc.</span><br/>
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</div>
|
||
|
||
</td>
|
||
</tr>
|
||
</table>
|
||
|
||
</div>
|
||
<!-- Hidden input for padding -->
|
||
<input type="hidden" value="ZAXZuLulfaIUmo99xU7RfH4bAV8AuMfIgekc30U3fGE4Tx46y608ayZjfwW1IdCsyCYsY8gIF2IPdlL5gykWYAi8nB8drMdm6lUTW9g8Piez3y4mYRq8rFSpLZ6DCv2QA5NVxOWQEdqfKYPT4iqCeztRAw3HXXWGipkO" id="padding" name="padding"/>
|
||
</div>
|
||
</div>
|
||
</div>
|
||
</main>
|
||
<footer id="footer" role="contentinfo">
|
||
<div class="container">
|
||
|
||
<div class="row">
|
||
<div class="col-sm-12">
|
||
<ul class="social-list pull-right">
|
||
<li class="field-item service-twitter list-horiz"><a
|
||
href="https://twitter.com/NISTCyber" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-twitter fa-fw"><span class="element-invisible">twitter</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span>
|
||
</a></li>
|
||
<li class="field-item service-facebook list-horiz"><a
|
||
href="https://www.facebook.com/NIST" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-facebook fa-fw"><span class="element-invisible">facebook</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-linkedin list-horiz"><a
|
||
href="https://www.linkedin.com/company/nist" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-linkedin fa-fw"><span class="element-invisible">linkedin</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-youtube list-horiz"><a
|
||
href="https://www.youtube.com/user/USNISTGOV" target="_blank" rel="noopener noreferrer"
|
||
class="social-btn social-btn--large extlink ext"> <i
|
||
class="fa fa-youtube fa-fw"><span class="element-invisible">youtube</span></i><span
|
||
class="ext"><span class="element-invisible"> (link
|
||
is external)</span></span></a></li>
|
||
<li class="field-item service-rss list-horiz"><a
|
||
href="https://www.nist.gov/news-events/nist-rss-feeds"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink">
|
||
<i class="fa fa-rss fa-fw"><span class="element-invisible">rss</span></i>
|
||
</a></li>
|
||
<li class="field-item service-govdelivery list-horiz last"><a
|
||
href="https://public.govdelivery.com/accounts/USNIST/subscriber/new?qsp=USNIST_3"
|
||
target="_blank" rel="noopener noreferrer" class="social-btn social-btn--large extlink ext">
|
||
<i class="fa fa-envelope fa-fw"><span
|
||
class="element-invisible">govdelivery</span></i><span class="ext"><span
|
||
class="element-invisible"> (link is external)</span></span>
|
||
</a></li>
|
||
</ul>
|
||
<span class="hidden-xs"> <a
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</span>
|
||
</div>
|
||
</div>
|
||
<div class="row hidden-sm hidden-md hidden-lg">
|
||
<div class="col-sm-12">
|
||
<a href="https://www.nist.gov"
|
||
title="National Institute of Standards and Technology" rel="home"
|
||
target="_blank" rel="noopener noreferrer" class="footer-nist-logo"> <img
|
||
src="/site-media/images/nist/nist-logo.png"
|
||
alt="National Institute of Standards and Technology logo" />
|
||
</a>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row footer-contact-container">
|
||
<div class="col-sm-6">
|
||
<strong>HEADQUARTERS</strong>
|
||
<br>
|
||
100 Bureau Drive
|
||
<br>
|
||
Gaithersburg, MD 20899
|
||
<br>
|
||
<a href="tel:301-975-2000">(301) 975-2000</a>
|
||
<br>
|
||
<br>
|
||
<a href="mailto:nvd@nist.gov">Webmaster</a> | <a
|
||
href="https://www.nist.gov/about-nist/contact-us">Contact Us</a>
|
||
| <a href="https://www.nist.gov/about-nist/visit"
|
||
style="display: inline-block;">Our Other Offices</a>
|
||
</div>
|
||
<div class="col-sm-6">
|
||
<div class="pull-right"
|
||
style="text-align:right">
|
||
<strong>Incident Response Assistance and Non-NVD Related<br>Technical Cyber Security Questions:</strong>
|
||
<br>
|
||
US-CERT Security Operations Center
|
||
<br> Email: <a href="mailto:soc@us-cert.gov">soc@us-cert.gov</a>
|
||
<br> Phone: 1-888-282-0870
|
||
</div>
|
||
</div>
|
||
</div>
|
||
|
||
<div class="row">
|
||
<nav title="Footer Navigation" role="navigation"
|
||
class="row footer-bottom-links-container">
|
||
<!-- https://github.com/usnistgov/nist-header-footer/blob/nist-pages/boilerplate-footer.html -->
|
||
<p>
|
||
<a href="https://www.nist.gov/oism/site-privacy">Site Privacy</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/accessibility">Accessibility</a>
|
||
|
|
||
<a href="https://www.nist.gov/privacy">Privacy Program</a>
|
||
|
|
||
<a href="https://www.nist.gov/oism/copyrights">Copyrights</a>
|
||
|
|
||
<a href="https://www.commerce.gov/vulnerability-disclosure-policy">Vulnerability Disclosure</a>
|
||
|
|
||
<a href="https://www.nist.gov/no-fear-act-policy">No Fear Act Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/foia">FOIA</a>
|
||
|
|
||
<a href="https://www.nist.gov/environmental-policy-statement">Environmental Policy</a>
|
||
|
|
||
<a href="https://www.nist.gov/summary-report-scientific-integrity">Scientific Integrity</a>
|
||
|
|
||
<a href="https://www.nist.gov/nist-information-quality-standards">Information Quality Standards</a>
|
||
|
|
||
<a href="https://www.commerce.gov/">Commerce.gov</a>
|
||
|
|
||
<a href="https://www.science.gov/">Science.gov</a>
|
||
|
|
||
<a href="https://www.usa.gov/">USA.gov</a>
|
||
</p>
|
||
</nav>
|
||
</div>
|
||
</div>
|
||
</footer>
|
||
</body>
|
||
</html>
|
||
|
||
|