Vulnerability Name:

CVE-2011-1548 (CCN-66490)

Assigned:2011-03-23
Published:2011-03-23
Updated:2011-04-21
Summary:The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
CVSS v3 Severity:5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.3 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:C/A:C)
5.7 Medium (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:C/A:C/E:H/RL:W/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Complete
Availibility (A): Complete
3.3 Low (CCN CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P)
3.0 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:H/RL:W/RC:UR)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:File Manipulation
References:Source: MISC
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544

Source: MITRE
Type: CNA
CVE-2011-1548

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110304 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110305 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110306 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110307 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110308 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110310 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110310 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110311 Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110314 Re: CVE Request -- logrotate -- nine issues

Source: CCN
Type: oss-security Mailing List, Wed, 23 Mar 2011 17:25:35 +0100
Re: CVE Request -- logrotate -- nine issues

Source: MLIST
Type: UNKNOWN
[oss-security] 20110323 Re: CVE Request -- logrotate -- nine issues

Source: CCN
Type: ASA-2011-419
Wind River Linux logrotate Security Update (WIND00266144)

Source: CCN
Type: Gentoo Web site
logrotate

Source: CCN
Type: OSVDB ID: 74753
logrotate log Directory Symlink / Hardlink Arbitrary File Overwrite

Source: BID
Type: UNKNOWN
47167

Source: CCN
Type: BID-47167
logrotate Debian Linux 'var/log/postgresql' Symlink Local Privilege Escalation Vulnerability

Source: XF
Type: UNKNOWN
gnulinux-logrotate-symlink(66490)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:gentoo:logrotate:*:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:linux:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:gentoo:logrotate:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:13515
    P
    USN-1172-1 -- logrotate vulnerabilities
    2014-06-30
    BACK
    gentoo logrotate *
    debian linux *
    gentoo logrotate *