First published: Tue Aug 07 2012(Updated: )
logol 1.5.0 uses world writable permissions for the /var/lib/logol/results directory, which allows local users to delete or overwrite arbitrary files.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Debian | =1.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3453 is considered a high severity vulnerability due to its potential impact on file integrity.
To fix CVE-2012-3453, change the permissions of the /var/lib/logol/results directory to remove world writable access.
CVE-2012-3453 affects users of logol version 1.5.0 on Debian systems.
CVE-2012-3453 is an access control vulnerability that allows local users to modify files.
Yes, CVE-2012-3453 can be exploited to conduct further attacks such as data corruption or unauthorized information access.