First published: Mon Nov 17 2008(Updated: )
rc.sysinit in initscripts 8.12-8.21 and 8.56.15-0.1 on rPath allows local users to delete arbitrary files via a symlink attack on a directory under (1) /var/lock or (2) /var/run. NOTE: this issue exists because of a race condition in an incorrect fix for CVE-2008-3524. NOTE: exploitation may require an unusual scenario in which rc.sysinit is executed other than at boot time.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat initscripts | =8.12-8.21 | |
Red Hat initscripts | =8.56.15-0.1 | |
rPath Appliance Platform Linux Service | =1 | |
rPath Appliance Platform Linux Service | =2 | |
rPath Linux | =1 | |
rPath Linux | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4832 has a moderate severity rating due to the local file deletion vulnerability.
To fix CVE-2008-4832, update the initscripts package to a version that is not affected, such as versions later than 8.56.15-0.1.
CVE-2008-4832 affects local users of rPath systems running specific vulnerable versions of initscripts.
CVE-2008-4832 is caused by a race condition in the rc.sysinit script related to symlink management.
No, CVE-2008-4832 requires local access to exploit due to its nature as a local privilege escalation vulnerability.