First published: Wed Jun 17 2015(Updated: )
It was reported that rsyslogd creates log files world-readable, which might lead to an information disclosure.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Rsyslog |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3243 has been classified as a medium severity vulnerability due to its potential for information disclosure.
To fix CVE-2015-3243, ensure that proper file permissions are enforced on log files created by rsyslog to prevent world-readable access.
The implications of CVE-2015-3243 include the risk of sensitive information being exposed to local users due to improperly set file permissions.
CVE-2015-3243 affects all versions of rsyslog prior to the implementation of more restrictive file permission settings.
No, CVE-2015-3243 is a local vulnerability that requires access to the system where rsyslog is running.