First published: Sun Apr 27 2014(Updated: )
Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Litech Router Advertisement Daemon | <=1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3602 has a moderate severity rating due to its potential for local user file overwriting and remote file manipulation.
To fix CVE-2011-3602, upgrade the router advertisement daemon to version 1.8.2 or later.
CVE-2011-3602 affects users of Litech Router Advertisement Daemon versions prior to 1.8.2.
CVE-2011-3602 can enable local and remote attackers to overwrite arbitrary files on the affected system.
No officially recommended workaround exists for CVE-2011-3602 aside from upgrading to the patched version.