Product Bulletin: RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034)

Product Bulletin: RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034)

https://access.redhat.com/security/vulnerabilities/RHSB-2022-001

RHSB-2022-001 Polkit Privilege Escalation - (CVE-2021-4034)

Executive summary

Red Hat is aware of a vulnerability found in pkexec that allows an authenticated user to perform a privilege escalation attack.

The polkit package is designed to define and handle policies that allow unprivileged processes to communicate with privileged processes on a Linux system. Pkexec, part of polkit, is a tool that allows the user to execute commands as another user according to the polkit policy definitions using the setuid feature. The vulnerability found in pkexec allows an unprivileged local attacker to escalate privileges, bypassing any authentication and policies due to incorrect handling of the process’s argument vector. 

The primary risk for customers is the possibility of an unprivileged user gaining administrative privileges on the affected systems. The attacker must have login access to the target system to carry out the attack.

This issue is assigned CVE-2021-4034 rated with a severity impact of Important.

The following Red Hat product versions are affected. “Affected” means that the vulnerability is present in the product’s code, irrespective of the usage or mitigations, which may address if the product is vulnerable.

Red Hat Enterprise Linux 6

Red Hat Enterprise Linux 7


ScopServ is aware a pkexec vulnerability in polkit.

We have released new packages for CentOS Version 6 that correct this vulnerability.

With this fix it is not necessary to purchase a support agreement from RedHat to patch this vulnerability.

Version:

scopserv-server-6.30.0.0.20220127-1
scopser-telephony-7.1.20220126-1

CentOS has officially released a corrected polkit version available by updating ScopTEL packages.

Version polkit.x86_64 0:0.112-26.el7_9.1

To protect your systems from this vulnerability ScopServ recommends you immediately update your server.



    • Related Articles

    • Product Bulletin: Changes to DND Activate and Deactivate Features Code

      In ScopTEL Telephony revisions prior to 2.7.7 the DND Activate Features Code would allow a device or user to dial the code and activate DND in the telephony database. Dialing the code when the extension was already in DND enabled status would allow ...
    • CVE-2015-0235 Ghost Vulnerability

      Details: https://rhn.redhat.com/errata/RHSA-2015-0090.html Updated glibc packages that fix one security issue are now available for ScopServ Distributions built on CentOS 5. Red Hat Product Security has rated this update as having Critical security ...
    • ScopServ Vulnerability CVE-2014-1691 January 26, 2015 Addendum

      In addition to https://service.scopserv.com/support/scopservhq/ShowHomePage.do?articlestatus=published#Solutions/dv/542955000000703295/en If your installation cannot immediately and fully be upgraded as per the product bulletin. You may use this ...
    • ScopTEL is not effected by CVE-2021-44228 log4j vulnerability

      ScopServ is aware of the Apache log4j vulnerability and has completed verification that this issue does not affect ScopTEL products or services. Log4j is a java addon, no ScopTEL code is written in Java. On December 9th 2021, Apache published a ...
    • ScopServ Vulnerability CVE-2014-1691 January 26, 2015

      Scope: ScopServ, ScopTEL installations could be vulnerable to CVE-2014-1691. Description: Unsanitized variables are passed to the unserialize() PHP function. A remote attacker could specially-craft one of those variables allowing to load and execute ...