Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-1548

Overview

Vulnerability Score 6.3 6.3
CVE Id CVE-2011-1548
Last Modified 20 Apr 2011 10:33:47
Published 30 Mar 2011 06:55:02
Confidentiality Impact NONE NONE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector LOCAL
Access Complexity MEDIUM
Authentication NONE

CVE-2011-1548

Summary

The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.

Vulnerable Systems

Application

  • Gentoo Logrotate


References

BID - 47167

MLIST - [oss-security] 20110323 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110314 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110310 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110308 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

MLIST - [oss-security] 20110304 CVE Request -- logrotate -- nine issues

MISC - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544


Last Updated: 27 May 2016 10:56:22