CVE-2009-4033

high

Description

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

References

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10555

https://exchange.xforce.ibmcloud.com/vulnerabilities/54677

https://bugzilla.redhat.com/show_bug.cgi?id=542926

https://bugzilla.redhat.com/show_bug.cgi?id=515062

http://www.securityfocus.com/bid/37249

http://www.redhat.com/support/errata/RHSA-2009-1642.html

http://www.mandriva.com/security/advisories?name=MDVSA-2009:342

http://securitytracker.com/id?1023284

Details

Source: Mitre, NVD

Published: 2009-12-08

Updated: 2017-09-19

Risk Information

CVSS v2

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Severity: Medium

CVSS v3

Base Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

Severity: High