CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
10.4%
The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
Vendor | Product | Version | CPE |
---|---|---|---|
christophe.varoqui | multipath-tools | 0.4.8 | cpe:2.3:a:christophe.varoqui:multipath-tools:0.4.8:*:*:*:*:*:*:* |
fedoraproject | fedora | 9 | cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* |
fedoraproject | fedora | 10 | cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
debian | debian_linux | 5.0 | cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
avaya | intuity_audix_lx | 2.0 | cpe:2.3:a:avaya:intuity_audix_lx:2.0:-:*:*:*:*:*:* |
avaya | intuity_audix_lx | 2.0 | cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp1:*:*:*:*:*:* |
avaya | intuity_audix_lx | 2.0 | cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp2:*:*:*:*:*:* |
avaya | message_networking | 3.1 | cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:* |
avaya | messaging_storage_server | 3.0 | cpe:2.3:a:avaya:messaging_storage_server:3.0:*:*:*:*:*:*:* |
download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml
kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
launchpad.net/bugs/cve/2009-0115
lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
lists.vmware.com/pipermail/security-announce/2010/000082.html
secunia.com/advisories/34418
secunia.com/advisories/34642
secunia.com/advisories/34694
secunia.com/advisories/34710
secunia.com/advisories/34759
secunia.com/advisories/38794
support.avaya.com/elmodocs2/security/ASA-2009-128.htm
www.debian.org/security/2009/dsa-1767
www.vupen.com/english/advisories/2010/0528
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9214
www.redhat.com/archives/fedora-package-announce/2009-April/msg00231.html
www.redhat.com/archives/fedora-package-announce/2009-April/msg00236.html
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
10.4%