CVE-2011-1548 | Date: (C)2011-03-30 (M)2023-12-22 |
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V2 Severity: |
CVSS Score : 6.3 |
Exploit Score: 3.4 |
Impact Score: 9.2 |
|
CVSS V2 Metrics: |
Access Vector: LOCAL |
Access Complexity: MEDIUM |
Authentication: NONE |
Confidentiality: NONE |
Integrity: COMPLETE |
Availability: COMPLETE |
| |