TROYANOSYVIRUS
Volver a CVEs

CVE-2011-1550

N/A

Descripcion

The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado3/30/2011
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

gentoo:logrotatenovell:opensuse_factory

Debilidades (CWE)

CWE-264

Referencias

http://openwall.com/lists/oss-security/2011/03/04/16(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/17(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/18(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/19(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/22(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/24(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/25(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/26(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/27(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/28(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/29(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/30(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/31(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/32(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/04/33(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/05/4(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/05/6(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/05/8(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/06/3(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/06/4(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/06/5(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/06/6(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/07/11(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/07/5(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/07/6(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/08/5(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/10/2(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/10/3(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/10/6(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/10/7(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/11/3(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/11/5(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/14/26(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2011/03/23/11(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.