CVE-2011-1020

high

Description

The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.

References

https://lkml.org/lkml/2011/2/9/417

https://lkml.org/lkml/2011/2/7/474

https://lkml.org/lkml/2011/2/7/466

https://lkml.org/lkml/2011/2/7/414

https://lkml.org/lkml/2011/2/7/404

https://lkml.org/lkml/2011/2/10/21

https://exchange.xforce.ibmcloud.com/vulnerabilities/65693

http://www.securityfocus.com/bid/46567

http://securityreason.com/securityalert/8107

http://secunia.com/advisories/43496

http://openwall.com/lists/oss-security/2011/02/25/2

http://openwall.com/lists/oss-security/2011/02/24/18

Details

Source: Mitre, NVD

Published: 2011-02-28

Updated: 2020-08-12

Risk Information

CVSS v2

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High