Vulnerability CVE-2008-6552


Published: 2009-03-30   Modified: 2012-02-12

Description:
Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9.

Vendor: Fedoraproject
Product: Fedora 
Version: 9;
Vendor: Redhat
Product: Gfs2-utils 
Version:
22.03.08-1
2.03.07-1
2.03.05-1
2.03.04-1
2.03.03-1
Product: Cluster project 
Version:
2.99.13
2.99.12
2.99.11
2.99.10
2.99.09
2.99.08
2.99.07
2.99.06
2.99.05
2.99.04
2.99.03
2.99.02
2.99.01
2.99.00
2.03.7
2.03.11
2.03.10
2.03.09
2.03.08
2.03.05
2.03.04
2.03.03
2.03.01
2.03.00
2.02.00
2.01.00
2.00.00
Product: Rgmanager 
Version:
2.03.08-1
2.03.07-1
2.03.05-1
2.03.04-1
2.03.03-1
Product: CMAN 
Version:
2.03.08-1
2.03.07-1
2.03.05-1
2.03.04-1
2.03.03-1

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11404
http://rhn.redhat.com/errata/RHSA-2009-1337.html
http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00163.html
http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00164.html
http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00165.html
http://www.redhat.com/support/errata/RHSA-2009-1339.html
http://www.redhat.com/support/errata/RHSA-2009-1341.html
http://www.redhat.com/support/errata/RHSA-2011-0264.html
http://www.redhat.com/support/errata/RHSA-2011-0265.html
http://www.securityfocus.com/bid/32179
http://www.ubuntu.com/usn/USN-875-1
http://www.vupen.com/english/advisories/2011/0416
http://www.vupen.com/english/advisories/2011/0417
https://exchange.xforce.ibmcloud.com/vulnerabilities/46412

Related CVE
CVE-2019-3896
A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial ...
CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denia...
CVE-2019-11477
Jonathan Looney discovered that the TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a denial of service. This ha...
CVE-2012-6711
A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to p...
CVE-2019-3888
A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUE...
CVE-2019-3875
A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the sepa...
CVE-2019-3873
It was found that Picketlink as shipped with Jboss Enterprise Application Platform 7.2 would accept an xinclude parameter in SAMLresponse XML. An attacker could use this flaw to send a URL to achieve cross-site scripting or possibly conduct further a...

Copyright 2019, cxsecurity.com

 

Back to Top