First published: Mon Mar 30 2009(Updated: )
The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
christophe.varoqui multipath-tools | =0.4.8 | |
Fedora | =9 | |
Fedora | =10 | |
Debian | =4.0 | |
Debian | =5.0 | |
Avaya Intuity Audix LX | =2.0 | |
Avaya Intuity Audix LX | =2.0-sp1 | |
Avaya Intuity Audix LX | =2.0-sp2 | |
Avaya Message Networking | =3.1 | |
Avaya Modular Messaging Message Storage Server | =3.0 | |
Avaya Modular Messaging Message Storage Server | =4.0 | |
Avaya Modular Messaging Message Storage Server | =5.0 | |
SUSE Open Enterprise Server | ||
openSUSE | >=10.3<=11.0 | |
SUSE Linux Enterprise Desktop with Beagle | =9 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10 | |
juniper ctpview | <7.1 | |
juniper ctpview | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0115 has a high severity rating due to its exploitation potential allowing unauthorized access through world-writable socket permissions.
To resolve CVE-2009-0115, change the permissions of the socket file '/var/run/multipathd.sock' to restrict access to only authorized users.
CVE-2009-0115 affects systems running multipath-tools version 0.4.8, including various SUSE, Fedora, and Debian distributions.
Exploitation of CVE-2009-0115 can lead to unauthorized access to system resources, manipulation of multipath configurations, or denial of service.
Yes, patches for CVE-2009-0115 are available from the respective Linux distribution maintainers to rectify the vulnerability.