Description


CA eHealth Performance Manager through 6.3.2.12 is affected by Privilege Escalation via a Dynamically Linked Shared Object Library. A regular user must create a malicious library in the writable RPATH, to be dynamically linked when the emtgtctl2 executable is run. The code in the library will be executed as the ehealth user. NOTE: This vulnerability only affects products that are no longer supported by the maintainer

Related CPE's


Weaknesses



CWE-426

134c704f-9b21-4f2e-91b3-4a467353bcc0

Secondary

CWE-426

CVSS impact metrics


CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.8 · High

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-03-26T07:15:12.730Z

4 years ago

Last modified

2024-11-21T04:59:23.697Z

1 year ago