| Vulnerability Name: | CVE-2011-2910 (CCN-69153) | ||||||||||||
| Assigned: | 2011-08-10 | ||||||||||||
| Published: | 2011-08-10 | ||||||||||||
| Updated: | 2019-11-26 | ||||||||||||
| Summary: | The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation. | ||||||||||||
| CVSS v3 Severity: | 6.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||
| CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.8 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:U/RC:UR)
6.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
| ||||||||||||
| Vulnerability Type: | CWE-269 | ||||||||||||
| Vulnerability Consequences: | Gain Privileges | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2011-2910 Source: CCN Type: gmane Mailing List, Dan Rosenberg | 10 Aug 05:33 CVE request (and disclosure): ax25d missing setuid return code check Source: CCN Type: SA45531 ax25-tools ax25d Privilege Escalation Security Issue Source: CCN Type: Ax.25 tools Web site AX.25 daemon Source: CCN Type: OSVDB ID: 74915 ax25-tools ax25d Return Value Checking Weakness Remote Privilege Escalation Source: CCN Type: BID-49107 Ax.25 Tools AX.25 daemon 'setuid()' Remote Privilege Escalation Vulnerability Source: CCN Type: BID-49150 ax25-tools Local Privilege Escalation Vulnerability Source: MISC Type: Broken Link https://access.redhat.com/security/cve/cve-2011-2910 Source: MISC Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2910 Source: XF Type: UNKNOWN ax25daemon-setuid-privilege-escalation(69153) Source: MISC Type: Third Party Advisory https://security-tracker.debian.org/tracker/CVE-2011-2910 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||
| Oval Definitions | |||||||||||||
| |||||||||||||
| BACK | |||||||||||||