Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-4033

Опубликовано: 07 дек. 2009
Источник: redhat
CVSS2: 6.9

Описание

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=542926acpid: log file created with random permissions

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

nvd
больше 15 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

debian
больше 15 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to ...

github
около 3 лет назад

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

oracle-oval
больше 15 лет назад

ELSA-2009-1642: acpid security update (IMPORTANT)

6.9 Medium

CVSS2