CVE-2011-1548Logrotate vulnerability

CWE-2645 documents5 sources
Severity
6.3MEDIUMNVD
EPSS
0.1%
top 81.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 30
Latest updateMay 17

Description

The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by /var/log/postgresql/.

CVSS vector

AV:L/AC:M/C:N/I:C/A:CExploitability: 3.4 | Impact: 9.2

Affected Packages2 packages

debiandebian/logrotate< logrotate 3.7.8-6 (bookworm)
Debianlogrotate_project/logrotate< 3.7.8-6+3

🔴Vulnerability Details

2
GHSA
GHSA-x7w4-r6vr-7hqw: The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, whi2022-05-17
OSV
CVE-2011-1548: The default configuration of logrotate on Debian GNU/Linux uses root privileges to process files in directories that permit non-root write access, whi2011-03-30

📋Vendor Advisories

2
Ubuntu
logrotate vulnerabilities2011-07-21
Debian
CVE-2011-1548: logrotate - The default configuration of logrotate on Debian GNU/Linux uses root privileges ...2011