Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2011-1549

The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 19.5%
CVSS Severity
CVSS v2 Score 6.3
References
Products affected by CVE-2011-1549
  • Gentoo » Logrotate » Version: Any
    cpe:2.3:a:gentoo:logrotate:*
  • Gentoo » Linux » Version: N/A
    cpe:2.3:o:gentoo:linux:-
  • Gentoo » Linux » Version: 1.2
    cpe:2.3:o:gentoo:linux:1.2
  • Gentoo » Linux » Version: 1.4
    cpe:2.3:o:gentoo:linux:1.4
  • Gentoo » Linux » Version: 2.1.30
    cpe:2.3:o:gentoo:linux:2.1.30
  • Gentoo » Linux » Version: 2.2.28
    cpe:2.3:o:gentoo:linux:2.2.28
  • Gentoo » Linux » Version: 2.3.30
    cpe:2.3:o:gentoo:linux:2.3.30


Contact Us

Shodan ® - All rights reserved