Описание
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
Ссылки
- Mailing ListVDB Entry
- Mailing ListVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue TrackingThird Party AdvisoryVDB Entry
- Mailing ListVDB Entry
- Mailing ListVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue TrackingThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:rsyslog:rsyslog:-:*:*:*:*:*:*:*
EPSS
Процентиль: 33%
0.00134
Низкий
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-532
Связанные уязвимости
CVSS3: 5.5
ubuntu
больше 8 лет назад
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
redhat
больше 10 лет назад
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.
CVSS3: 5.5
debian
больше 8 лет назад
rsyslog uses weak permissions for generating log files, which allows l ...
EPSS
Процентиль: 33%
0.00134
Низкий
5.5 Medium
CVSS3
2.1 Low
CVSS2
Дефекты
CWE-532