6.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.1%
A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | acpid | <Β 1:2.0.33-2 | acpid_1:2.0.33-2_all.deb |
Debian | 11 | all | acpid | <Β 1:2.0.32-1 | acpid_1:2.0.32-1_all.deb |
Debian | 999 | all | acpid | <Β 1:2.0.34-1 | acpid_1:2.0.34-1_all.deb |
Debian | 13 | all | acpid | <Β 1:2.0.34-1 | acpid_1:2.0.34-1_all.deb |