CVE-2011-1550

The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.3 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:N/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
VendorProductVersion
gentoologrotate
*
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
logrotate
bullseye
3.18.0-2+deb11u2
fixed
bookworm
3.21.0-1
fixed
sid
3.22.0-1
fixed
trixie
3.22.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
logrotate
maverick
not-affected
lucid
not-affected
karmic
not-affected
hardy
not-affected
dapper
not-affected
Common Weakness Enumeration
References