The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
References
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2011-03-30 22:55
Updated : 2011-04-21 02:33
NVD link : CVE-2011-1548
Mitre link : CVE-2011-1548
CVE.ORG link : CVE-2011-1548
JSON object : View
Products Affected
debian
- linux
gentoo
- logrotate
CWE
CWE-264
Permissions, Privileges, and Access Controls