Vulnerability CVE-2011-3602


Published: 2014-04-27   Modified: 2014-04-28

Description:
Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files.

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Partial
Affected software
Litech -> Router advertisement daemon 

 References:
https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc
http://www.ubuntu.com/usn/USN-1257-1
http://www.openwall.com/lists/oss-security/2011/10/06/3
http://www.litech.org/radvd/CHANGES
http://www.debian.org/security/2011/dsa-2323

Copyright 2024, cxsecurity.com

 

Back to Top