CVE-2011-1548 — Logrotate vulnerability
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 81.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 30
Latest updateMay 17
Description
The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.
CVSS vector
AV:L/AC:M/C:N/I:C/A:CExploitability: 3.4 | Impact: 9.2
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-x7w4-r6vr-7hqw: The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, whi↗2022-05-17
OSV▶
CVE-2011-1548: The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, whi↗2011-03-30