CWE
264
Advisory Published
CVE Published
Updated

CVE-2008-6755

First published: Mon Dec 15 2008(Updated: )

While checking Gentoo bug: <a href="http://bugs.gentoo.org/show_bug.cgi?id=250715">http://bugs.gentoo.org/show_bug.cgi?id=250715</a> I noticed that zoneminder in Fedora defaults to apache:apache 600 for /etc/zm.conf. Therefore, Fedora defaults does now allow reading the config file directly using cat or vim. chmod o-r is probably not much of a fix in setups where local users can run own php or cgi scripts with web server privileges. However, in such setups, Fedora default seems even worse, as any php or cgi can actually modify the config (and at least break DB connectivity). In similar cases, where some daemon user needs read access to certain config file, root:&lt;daemon_group&gt; 640 is more common. Please check if changing: %config(noreplace) %attr(600,%{zmuid_final},%{zmgid_final}) %{_sysconfdir}/zm.conf to %config(noreplace) %attr(640,root,%{zmgid_final}) %{_sysconfdir}/zm.conf makes sense for ZM.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
ZoneMinder=1.23.3
Fedora=10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2008-6755?

    The severity of CVE-2008-6755 is considered low, primarily because it involves a misconfiguration rather than an exploit that can be easily leveraged.

  • How do I fix CVE-2008-6755?

    To fix CVE-2008-6755, change the permissions on /etc/zm.conf to a more secure setting that allows appropriate users to read the configuration.

  • Which software is affected by CVE-2008-6755?

    CVE-2008-6755 specifically affects ZoneMinder version 1.23.3 running on Fedora 10.

  • What happens if CVE-2008-6755 is exploited?

    If exploited, CVE-2008-6755 could result in unauthorized access to sensitive configuration information that should be protected.

  • Is there a workaround for CVE-2008-6755?

    A possible workaround for CVE-2008-6755 is to manually set proper file permissions for /etc/zm.conf to limit unauthorized access.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203