First published: Wed Jul 27 2011(Updated: )
opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nrl Opie | =2.3 | |
Nrl Opie | <=2.4.1 | |
Nrl Opie | =2.10 | |
Nrl Opie | =2.2 | |
Nrl Opie | =2.32 | |
Nrl Opie | =2.4 | |
Nrl Opie | =2.21 | |
Nrl Opie | =2.22 | |
Nrl Opie | =2.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2490 is classified as a high severity vulnerability due to the potential for local privilege escalation.
To mitigate CVE-2011-2490, update to a patched version of OPIE that addresses the issue with the setuid system call.
CVE-2011-2490 affects local users of OPIE versions 2.4.1-test1 and earlier, and certain specific versions of OPIE 2.x.
CVE-2011-2490 exploits the lack of return value checks on the setuid system call, allowing privilege escalation.
While the best solution is to update OPIE, temporarily restricting local user access may serve as a workaround for CVE-2011-2490.