First published: Wed Mar 30 2011(Updated: )
The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Logrotate | ||
openSUSE Factory |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1550 is considered a moderate severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2011-1550, you should ensure that logrotate is configured not to process files in untrusted directories.
CVE-2011-1550 affects users of the logrotate utility on systems with default configurations that allow non-root write access.
CVE-2011-1550 allows local users to conduct symlink and hard link attacks due to inadequate support for untrusted directories in logrotate.
The default configuration in openSUSE Factory has been identified as vulnerable to CVE-2011-1550.