CVE-2011-1548

Published Mar 30, 2011

Last updated 14 years ago

Overview

Description
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
6.3
Impact score
9.2
Exploitability score
3.4
Vector string
AV:L/AC:M/Au:N/C:N/I:C/A:C

Weaknesses

nvd@nist.gov
CWE-264

Configurations

References