The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages.
References
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2011-03-30 22:55
Updated : 2011-04-21 02:33
NVD link : CVE-2011-1549
Mitre link : CVE-2011-1549
CVE.ORG link : CVE-2011-1549
JSON object : View
Products Affected
gentoo
- linux
- logrotate
CWE
CWE-264
Permissions, Privileges, and Access Controls