519 Easton Road, Riegelsville, PA 18077, USA
+1- 908-537-6520

Security Bulletin:

CVE-2019-17445 | Agents vulnerability via Symbolic Link Following

CVE-2019-17445 | Linux Agents vulnerability via Symbolic Link Following

Security Vulnerability

Published: 10/10/2019

MITRE CVE-2019-17445

Discovered and reported by: Rich Mirch, State Farm Red Team

An issue was discovered in Eracent EDA, EPA, EPM, EUA, FLW, and SUM Agent through 10.2.26. The agent executable, when installed for non-root operations (scanning), can be forced to copy files from the filesystem to other locations via Symbolic Link Following. An attacker who successfully exploited this vulnerability could lead to file content exposure, corruption or denial-of-service.

To exploit this vulnerability, an attacker would need use local login to non-privileged account on the Linux system with affected agent version installed for non-root operations.

This vulnerability applies specifically to Linux agents running in non-root mode only.

The update addresses the vulnerability by correcting how the agent upon startup sets its current working directory to the path where it is installed.

8 Tips for a Successful SAP Audit

Get your copy of "8 Tips For A Successful SAP Audit" today!

You'll get valuable information that will help you develop a strategy for a positive audit result - and huge savings on your SAP licensing.