First published: Thu Nov 08 2018(Updated: )
keepalived 2.0.8 didn't check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. If a local attacker had previously created a file with the expected name (e.g., /tmp/keepalived.data or /tmp/keepalived.stats), with read access for the attacker and write access for the keepalived process, then this potentially leaked sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Keepalived Keepalived | =2.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19046 is a vulnerability in keepalived version 2.0.8 that allows a local attacker to gain read access to sensitive files.
CVE-2018-19046 affects keepalived version 2.0.8.
The severity of CVE-2018-19046 is medium, with a CVSS score of 4.7.
An attacker can exploit CVE-2018-19046 by creating a file with the expected name and gaining read access to sensitive data.
Yes, the fix for CVE-2018-19046 is to update to a version of keepalived that is not affected by this vulnerability.