CVE-2008-6552

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9.

References

http://osvdb.org/50299

http://osvdb.org/50300

http://osvdb.org/50301

http://rhn.redhat.com/errata/RHSA-2009-1337.html

http://secunia.com/advisories/32602

http://secunia.com/advisories/32616

http://secunia.com/advisories/36530

http://secunia.com/advisories/36555

http://secunia.com/advisories/43367

http://secunia.com/advisories/43372

http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00163.html

http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00164.html

http://www.redhat.com/archives/fedora-package-announce/2008-November/msg00165.html

http://www.redhat.com/support/errata/RHSA-2009-1339.html

http://www.redhat.com/support/errata/RHSA-2009-1341.html

http://www.redhat.com/support/errata/RHSA-2011-0264.html

http://www.redhat.com/support/errata/RHSA-2011-0265.html

http://www.securityfocus.com/bid/32179

http://www.ubuntu.com/usn/USN-875-1

http://www.vupen.com/english/advisories/2011/0416

http://www.vupen.com/english/advisories/2011/0417

https://exchange.xforce.ibmcloud.com/vulnerabilities/46412

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11404

Details

Source: MITRE

Published: 2009-03-30

Updated: 2017-09-29

Type: CWE-59

Risk Information

CVSS v2

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:redhat:cluster_project:2.00.00:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.01.00:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.02.00:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.00:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.01:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.03:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.04:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.05:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.7:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.08:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.09:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.10:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.03.11:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.00:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.01:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.02:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.03:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.04:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.05:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.06:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.07:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.08:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.09:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.10:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.11:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.12:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cluster_project:2.99.13:*:*:*:*:*:*:*

Configuration 2

AND

OR

cpe:2.3:a:redhat:cman:2.03.03-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cman:2.03.04-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cman:2.03.05-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cman:2.03.07-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:cman:2.03.08-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:rgmanager:2.03.03-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:rgmanager:2.03.04-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:rgmanager:2.03.05-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:rgmanager:2.03.07-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:rgmanager:2.03.08-1:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*

OR

cpe:2.3:a:redhat:gfs2-utils:2.03.03-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:gfs2-utils:2.03.04-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:gfs2-utils:2.03.05-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:gfs2-utils:2.03.07-1:*:*:*:*:*:*:*

cpe:2.3:a:redhat:gfs2-utils:22.03.08-1:*:*:*:*:*:*:*

Tenable Plugins

View all (13 total)

IDNameProductFamilySeverity
63894RHEL 5 : cman (RHSA-2009:1341)NessusRed Hat Local Security Checks
medium
63893RHEL 5 : rgmanager (RHSA-2009:1339)NessusRed Hat Local Security Checks
medium
60961Scientific Linux Security Update : rgmanager on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60957Scientific Linux Security Update : ccs on SL4.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60659Scientific Linux Security Update : rgmanager on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60653Scientific Linux Security Update : gfs2-utils on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
60650Scientific Linux Security Update : cman on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
43788CentOS 5 : cman (CESA-2009:1341)NessusCentOS Local Security Checks
medium
43787CentOS 5 : rgmanager (CESA-2009:1339)NessusCentOS Local Security Checks
medium
43786CentOS 5 : gfs2-utils (CESA-2009:1337)NessusCentOS Local Security Checks
medium
43368Ubuntu 6.06 LTS / 8.04 LTS / 8.10 : redhat-cluster, redhat-cluster-suite vulnerabilities (USN-875-1)NessusUbuntu Local Security Checks
high
40839RHEL 5 : gfs2-utils (RHSA-2009:1337)NessusRed Hat Local Security Checks
medium
34716Fedora 9 : cman-2.03.09-1.fc9 / gfs2-utils-2.03.09-1.fc9 / rgmanager-2.03.09-1.fc9 (2008-9458)NessusFedora Local Security Checks
high