The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2011-03-30 15:55
Updated : 2011-04-20 19:33
NVD link : CVE-2011-1549
Mitre link : CVE-2011-1549
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
gentoo
- linux
- logrotate