CVE-2011-1548

Published Mar 30, 2011

Last updated 3 months ago

Overview

Description
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
Source
cve@mitre.org
NVD status
Modified

Risk scores

CVSS 2.0

Type
Primary
Base score
6.3
Impact score
9.2
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:N/I:C/A:C

Weaknesses

nvd@nist.gov
CWE-264

Social media

Hype score
Not currently trending

Configurations

References