Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-4411

Опубликовано: 18 сент. 2008
Источник: redhat
CVSS2: 3.3
EPSS Низкий

Описание

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

Отчет

Not vulnerable. This issue did not affect the versions of acl as shipped with Red Hat Enterprise Linux 3, 4, or 5.

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=550346acl: vulnerable to symlink attacks

EPSS

Процентиль: 21%
0.00068
Низкий

3.3 Low

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

nvd
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

debian
почти 16 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when runni ...

github
больше 3 лет назад

The (1) setfacl and (2) getfacl commands in XFS acl 2.2.47, when running in recursive (-R) mode, follow symbolic links even when the --physical (aka -P) or -L option is specified, which might allow local users to modify the ACL for arbitrary files or directories via a symlink attack.

EPSS

Процентиль: 21%
0.00068
Низкий

3.3 Low

CVSS2