Lucene search

K
redosRedosROS-20240904-14
HistorySep 04, 2024 - 12:00 a.m.

ROS-20240904-14

2024-09-0400:00:00
redos.red-soft.ru
1
performance co-pilot
pcp
vulnerability
mixed privilege levels
information disclosure
exploitation
symbolic link attack
isolation
pmproxy
arbitrary commands
unix

CVSS3

8.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

A vulnerability in Performance Co-Pilot performance monitoring and visualization software
(PCP) is related to the mixed privilege levels used by systemd services associated with PCP.
Exploitation of the vulnerability could allow an attacker to execute a symbolic link attack
and break the isolation of the PCP user

Vulnerability in the pmproxy component of performance monitoring and visualization software
Performance Co-Pilot (PCP) is related to the disclosure of information in an erroneous data area. Exploitation of the
The vulnerability could allow an attacker acting remotely to execute arbitrary commands

OSVersionArchitecturePackageVersionFilename
redos7.3x86_64pcp< 6.2.0-1UNKNOWN

CVSS3

8.8

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.4

Confidence

Low