Vulnerability CVE-2011-1022


Published: 2011-03-22   Modified: 2012-02-13

Description:
The cgre_receive_netlink_msg function in daemon/cgrulesengd.c in cgrulesengd in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 does not verify that netlink messages originated in the kernel, which allows local users to bypass intended resource restrictions via a crafted message.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.1/10
2.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Balbir singh -> Libcgroup 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=680409
http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download
http://sourceforge.net/mailarchive/message.php?msg_id=27102603
http://sourceforge.net/mailarchive/message.php?msg_id=26598749
http://openwall.com/lists/oss-security/2011/02/25/9
http://openwall.com/lists/oss-security/2011/02/25/6
http://openwall.com/lists/oss-security/2011/02/25/12
http://openwall.com/lists/oss-security/2011/02/25/11
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=615987
http://www.vupen.com/english/advisories/2011/0774
http://www.vupen.com/english/advisories/2011/0679
http://www.securitytracker.com/id?1025157
http://www.securityfocus.com/bid/46578
http://www.redhat.com/support/errata/RHSA-2011-0320.html
http://www.debian.org/security/2011/dsa-2193
http://secunia.com/advisories/44093
http://secunia.com/advisories/43891
http://secunia.com/advisories/43758
http://secunia.com/advisories/43611
http://openwall.com/lists/oss-security/2011/02/25/14
http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html

Copyright 2024, cxsecurity.com

 

Back to Top