| Vulnerability Name: | CVE-2011-1159 (CCN-64861) | ||||||||||||
| Assigned: | 2011-01-19 | ||||||||||||
| Published: | 2011-01-19 | ||||||||||||
| Updated: | 2012-05-14 | ||||||||||||
| Summary: | acpid.c in acpid before 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but no read system calls. | ||||||||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||||||||
| CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P) 1.8 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:W/RC:UR)
4.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:W/RC:UR)
| ||||||||||||
| Vulnerability Type: | CWE-20 | ||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||
| References: | Source: CCN Type: SourceForge.net acpid - the ACPI event daemon Source: MITRE Type: CNA CVE-2011-1159 Source: FEDORA Type: Patch FEDORA-2011-6681 Source: FEDORA Type: Patch FEDORA-2011-6460 Source: CCN Type: SA42947 acpid Socket Blocking Denial of Service Source: SECUNIA Type: Vendor Advisory 42947 Source: SECUNIA Type: Vendor Advisory 44621 Source: DEBIAN Type: DSA-2362 acpid -- several vulnerabilities Source: CCN Type: oss-security: Vasiliy Kulikov | 19 Jan 15:03 2 acpid flaws Source: MLIST Type: Exploit, Patch [oss-security] 20110119 2 acpid flaws Source: MLIST Type: Exploit, Patch [oss-security] 20110315 Re: 2 acpid flaws Source: MLIST Type: Exploit, Patch [oss-security] 20110315 Re: 2 acpid flaws Source: CCN Type: OSVDB ID: 70625 acpid Daemon Socket Blocking Mode Local DoS Source: BID Type: UNKNOWN 45915 Source: CCN Type: BID-45915 acpid Multiple Local Denial of Service Vulnerabilities Source: CONFIRM Type: Patch https://bugzilla.redhat.com/show_bug.cgi?id=688698 Source: XF Type: UNKNOWN acpid-socket-blocking-dos(64861) | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
| Oval Definitions | |||||||||||||
| |||||||||||||
| BACK | |||||||||||||