CVE-2011-2729
Published Aug 15, 2011
Last updated 2 years ago
Overview
- Description
- native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.3:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6AB9C8A4-9E4F-4B5E-B20E-01B0C6DA623E" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.4:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EC41DBC3-1DA3-4C63-A360-253937FE2409" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.5:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "175FC97E-F4C2-43BA-BEF8-66DA0BC627C1" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B69A27DD-4056-4644-AA16-70B16642FAA7" }, { "criteria": "cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B980C39-A4D8-483A-B48C-36CA4F5CEAA1" }, { "criteria": "cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFF7178D-DC9B-45F7-BEA4-701B1EAEC2CC" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.3:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6AB9C8A4-9E4F-4B5E-B20E-01B0C6DA623E" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.4:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EC41DBC3-1DA3-4C63-A360-253937FE2409" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.5:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "175FC97E-F4C2-43BA-BEF8-66DA0BC627C1" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B69A27DD-4056-4644-AA16-70B16642FAA7" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9E03BE3-60CC-4415-B993-D0BB00F87A30" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE92E59A-FF0D-4D1A-8B12-CC41A7E1FD3C" }, { "criteria": "cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFD64FE7-ABAF-49F3-B8D0-91C37C822F4B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AB9C8A4-9E4F-4B5E-B20E-01B0C6DA623E" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC41DBC3-1DA3-4C63-A360-253937FE2409" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "175FC97E-F4C2-43BA-BEF8-66DA0BC627C1" }, { "criteria": "cpe:2.3:a:apache:apache_commons_daemon:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B69A27DD-4056-4644-AA16-70B16642FAA7" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F8C62EF-1B67-456A-9C66-755439CF8556" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33E9607B-4D28-460D-896B-E4B7FA22441E" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A819E245-D641-4F19-9139-6C940504F6E7" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C381275-10C5-4939-BCE3-0D1F3B3CB2EE" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7205475A-6D04-4042-B24E-1DA5A57029B7" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08022987-B36B-4F63-88A5-A8F59195DF4A" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF4B7557-EF35-451E-B55D-3296966695AC" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8980E61E-27BE-4858-82B3-C0E8128AF521" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8756BF9B-3E24-4677-87AE-31CE776541F0" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88CE057E-2092-4C98-8D0C-75CF439D0A9C" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F194580-EE6D-4E38-87F3-F0661262256B" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9731BAA-4C6C-4259-B786-F577D8A90FA1" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F74A421-D019-4248-84B8-C70D4D9A8A95" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BA27FF9-4C66-4E17-95C0-1CB2DAA6AFC8" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05346F5A-FB52-4376-AAC7-9A5308216545" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "305688F2-50A6-41FB-8614-BC589DB9A789" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25966344-15D5-4101-9346-B06BFD2DFFF5" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11F4CBAC-27B1-4EFF-955A-A63B457D0578" }, { "criteria": "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D4F710E-06EA-48F4-AC6A-6F143950F015" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" } ], "operator": "OR" } ], "operator": "AND" } ]