Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2011-1550
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2011-1550

2022-10-0316:15:09
Debian Security Bug Tracker
security-tracker.debian.org
9
logrotate configuration
symlink attacks
hard link attacks
non-root write access
cobbler
inn
safte-monitor
uucp

6.3 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:C/A:C

0.0004 Low

EPSS

Percentile

10.2%

The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate’s lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.

6.3 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:N/I:C/A:C

0.0004 Low

EPSS

Percentile

10.2%

Related for DEBIANCVE:CVE-2011-1550