CVE-2015-3243
25.07.2017, 18:29
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.Enginsight
Vendor | Product | Version |
---|---|---|
rsyslog | rsyslog | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References