First published: Wed Mar 30 2011(Updated: )
The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Logrotate | ||
Gentoo Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1549 has a medium severity rating due to its exploitation potential by local users.
To fix CVE-2011-1549, modify the logrotate configuration to restrict access to untrusted directories or run logrotate with appropriate permissions.
CVE-2011-1549 primarily affects users of Gentoo Linux using the default logrotate configuration.
CVE-2011-1549 allows local users to perform symlink and hard link attacks due to the misconfiguration of logrotate.
CVE-2011-1549 is a local vulnerability, allowing exploitation by users with access to the affected system.