The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
References
Link | Resource |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-2910 | Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-2910 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2910 | Issue Tracking Third Party Advisory |
Information
Published : 2019-11-15 09:15
Updated : 2019-11-26 07:08
NVD link : CVE-2011-2910
Mitre link : CVE-2011-2910
JSON object : View
CWE
CWE-269
Improper Privilege Management
Products Affected
debian
- debian_linux
linux-ax25
- ax25-tools