The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2011-03-30 15:55
Updated : 2011-04-20 19:33
NVD link : CVE-2011-1548
Mitre link : CVE-2011-1548
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
gentoo
- logrotate
debian
- linux