SB2021020409 - Multiple vulnerabilities in Red Hat Virtualization for RHEL 8
Published: February 4, 2021 Updated: May 14, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Insufficient verification of data authenticity (CVE-ID: CVE-2020-25684)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a lack of proper address/port check within the "reply_query" function. A remote attacker can perform a DNS cache poisoning attack.
2) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2020-25685)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a lack of query resource name (RRNAME) checks in the "reply_query" function. A remote attacker can perform a DNS cache poisoning attack.
3) Insufficient verification of data authenticity (CVE-ID: CVE-2020-25686)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the affected software does not check for an existing pending request for the same name and forwards a new request. A remote attacker can perform a DNS cache poisoning attack.
4) Heap-based buffer overflow (CVE-ID: CVE-2021-3156)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in sudo. A local user can pass specially crafted data to the application, trigger heap-based buffer overflow and execute arbitrary code on the target system with root privileges.
Remediation
Install update from vendor's website.