First published: Fri Sep 08 2017(Updated: )
The YaST2 network created files with world readable permissions which could have allowed local users to read sensitive material out of network configuration files, like passwords for wireless networks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
YaST |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-3177 is considered to be moderate due to the exposure of sensitive information.
To fix CVE-2011-3177, ensure that YaST2 is updated to a version that restricts file permissions to prevent world readability.
CVE-2011-3177 affects network configuration files created by YaST2, which may contain sensitive information such as passwords.
Local users on systems with vulnerable versions of YaST2 are affected by CVE-2011-3177, as they can access sensitive configuration files.
While there are no widely reported exploits specifically targeting CVE-2011-3177, the vulnerability allows access to sensitive information that could be exploited.