CVE-2008-4579

Published Oct 15, 2008

Last updated 2 years ago

Overview

Description
The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.
Source
secalert@redhat.com
NVD status
Modified

Risk scores

CVSS 2.0

Type
Primary
Base score
1.9
Impact score
2.9
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:N/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-59

Social media

Hype score
Not currently trending

Vendor comments

  • Red HatThe Red Hat Security Response Team has rated this issue as having low security impact. This issue is addressed in the cman package for Red Hat Enterprise Linux 5: https://rhn.redhat.com/errata/RHSA-2009-1337.html This issue also affects the fence package in Red Hat Cluster Suite for Enterprise Linux 4AS, a future update may address this flaw: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-4579

Configurations