Vulnerability CVE-2011-1020


Published: 2011-02-28   Modified: 2012-02-13

Description:
The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Linux Kernel \"/proc/<pid>/\" Permissions Handling Weakness
halfdog
01.03.2011

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Linux -> Kernel 

 References:
https://lkml.org/lkml/2011/2/9/417
https://lkml.org/lkml/2011/2/7/474
https://lkml.org/lkml/2011/2/7/466
https://lkml.org/lkml/2011/2/7/414
https://lkml.org/lkml/2011/2/7/404
https://lkml.org/lkml/2011/2/7/368
https://lkml.org/lkml/2011/2/10/21
http://xforce.iss.net/xforce/xfdb/65693
http://www.securityfocus.com/bid/46567
http://www.halfdog.net/Security/2011/SuidBinariesAndProcInterface/
http://securityreason.com/securityalert/8107
http://secunia.com/advisories/43496
http://seclists.org/fulldisclosure/2011/Jan/421
http://openwall.com/lists/oss-security/2011/02/25/2
http://openwall.com/lists/oss-security/2011/02/24/18

Copyright 2024, cxsecurity.com

 

Back to Top