Lucene search

K
nvd[email protected]NVD:CVE-2011-2729
HistoryAug 15, 2011 - 9:55 p.m.

CVE-2011-2729

2011-08-1521:55:02
CWE-264
web.nvd.nist.gov
6

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

4.3

Confidence

High

EPSS

0.002

Percentile

57.8%

native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.

Affected configurations

Nvd
Node
apacheapache_commons_daemonMatch1.0.3
OR
apacheapache_commons_daemonMatch1.0.4
OR
apacheapache_commons_daemonMatch1.0.5
OR
apacheapache_commons_daemonMatch1.0.6
OR
apachetomcatMatch5.5.32
OR
apachetomcatMatch5.5.33
AND
linuxlinux_kernel
Node
apacheapache_commons_daemonMatch1.0.3
OR
apacheapache_commons_daemonMatch1.0.4
OR
apacheapache_commons_daemonMatch1.0.5
OR
apacheapache_commons_daemonMatch1.0.6
OR
apachetomcatMatch6.0.30
OR
apachetomcatMatch6.0.31
OR
apachetomcatMatch6.0.32
AND
linuxlinux_kernel
Node
apacheapache_commons_daemonMatch1.0.3
OR
apacheapache_commons_daemonMatch1.0.4
OR
apacheapache_commons_daemonMatch1.0.5
OR
apacheapache_commons_daemonMatch1.0.6
OR
apachetomcatMatch7.0.0
OR
apachetomcatMatch7.0.0beta
OR
apachetomcatMatch7.0.1
OR
apachetomcatMatch7.0.2
OR
apachetomcatMatch7.0.3
OR
apachetomcatMatch7.0.4
OR
apachetomcatMatch7.0.5
OR
apachetomcatMatch7.0.6
OR
apachetomcatMatch7.0.7
OR
apachetomcatMatch7.0.8
OR
apachetomcatMatch7.0.9
OR
apachetomcatMatch7.0.10
OR
apachetomcatMatch7.0.11
OR
apachetomcatMatch7.0.12
OR
apachetomcatMatch7.0.13
OR
apachetomcatMatch7.0.14
OR
apachetomcatMatch7.0.16
OR
apachetomcatMatch7.0.17
OR
apachetomcatMatch7.0.19
AND
linuxlinux_kernel
VendorProductVersionCPE
apacheapache_commons_daemon1.0.3cpe:2.3:a:apache:apache_commons_daemon:1.0.3:*:*:*:*:*:*:*
apacheapache_commons_daemon1.0.4cpe:2.3:a:apache:apache_commons_daemon:1.0.4:*:*:*:*:*:*:*
apacheapache_commons_daemon1.0.5cpe:2.3:a:apache:apache_commons_daemon:1.0.5:*:*:*:*:*:*:*
apacheapache_commons_daemon1.0.6cpe:2.3:a:apache:apache_commons_daemon:1.0.6:*:*:*:*:*:*:*
apachetomcat5.5.32cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*
apachetomcat5.5.33cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
apachetomcat6.0.30cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*
apachetomcat6.0.31cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*
apachetomcat6.0.32cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*
Rows per page:
1-10 of 291

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

4.3

Confidence

High

EPSS

0.002

Percentile

57.8%