Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3243

Опубликовано: 25 июл. 2017
Источник: debian

Описание

rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
rsyslogunfixedpackage

Примечания

  • The default for syslog is $FileCreateMode 0644 but the rsyslog.conf

  • provided by the Debian package sets $FileCreateMode 0640

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 8 лет назад

rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.

redhat
больше 10 лет назад

rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.

CVSS3: 5.5
nvd
больше 8 лет назад

rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.

suse-cvrf
больше 7 лет назад

Security update for rsyslog

suse-cvrf
больше 7 лет назад

Security update for rsyslog