The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/cve-2011-2910 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2910 | Issue Tracking Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-2910 | Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-2910 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2910 | Issue Tracking Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-2910 | Third Party Advisory |
Configurations
History
21 Nov 2024, 01:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/cve-2011-2910 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2910 - Issue Tracking, Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2011-2910 - Third Party Advisory |
Information
Published : 2019-11-15 17:15
Updated : 2024-11-21 01:29
NVD link : CVE-2011-2910
Mitre link : CVE-2011-2910
CVE.ORG link : CVE-2011-2910
JSON object : View
Products Affected
debian
- debian_linux
linux-ax25
- ax25-tools
CWE
CWE-269
Improper Privilege Management