CCE-92405-0Platform: cpe:/o:oracle:linux:7 | Date: (C)2019-11-07 (M)2023-07-04 |
To set the runtime status of the 'fs.suid_dumpable' kernel parameter,
run the following command:
Parameter:
[no/yes]
Technical Mechanism:
The core dump of a setuid program is more likely to contain
sensitive data, as the program itself runs with greater privileges than the
user who initiated execution of the program. Disabling the ability for any
setuid program to write a core file decreases the risk of unauthorized access
of such data.
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.2 | Attack Vector: LOCAL |
Exploit Score: 1.5 | Attack Complexity: LOW |
Impact Score: 6.0 | Privileges Required: HIGH |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H | Scope: CHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:49347 |