Show plain JSON{"id": "CVE-2011-1549", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.3, "accessVector": "LOCAL", "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 9.2, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.4, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-03-30T22:55:02.610", "references": [{"url": "http://openwall.com/lists/oss-security/2011/03/04/16", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/17", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/18", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/19", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/22", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/24", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/25", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/26", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/27", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/28", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/29", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/30", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/31", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/32", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/33", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/05/4", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/05/6", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/05/8", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/3", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/4", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/5", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/6", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/07/11", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/07/5", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/07/6", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/08/5", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/2", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/3", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/6", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/7", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/11/3", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/11/5", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/14/26", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/23/11", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/47170", "source": "cve@mitre.org"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/16", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/17", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/18", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/19", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/22", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/24", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/25", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/26", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/27", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/28", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/29", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/30", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/31", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/32", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/04/33", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/05/4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/05/6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/05/8", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/4", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/06/6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/07/11", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/07/5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/07/6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/08/5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/6", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/10/7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/11/3", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/11/5", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/14/26", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://openwall.com/lists/oss-security/2011/03/23/11", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/47170", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "The default configuration of logrotate on Gentoo Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories under /var/log/ for packages."}, {"lang": "es", "value": "La configuraci\u00f3n por defecto en logrotate en Gentoo Linux utiliza privilegios de administrador para procear archivos en directorios que permite a no-administradores acceso de escritura, lo que permite a usuarios locales conducir ataques de enlace simb\u00f3lico y enlace fijo aprovech\u00e1ndose de la falta de soporte en logrotate en directorios no confiables, como fue demostrado en directorios bajo /var/log/ para paquetes."}], "lastModified": "2024-11-21T01:26:34.157", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:gentoo:logrotate:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24285EAC-E6BE-421E-B6C1-35CF176769E5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "647BA336-5538-4972-9271-383A0EC9378E"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}