CVE-2011-2729

MEDIUM

Description

native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.

References

http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00024.html

http://mail-archives.apache.org/mod_mbox/commons-dev/201108.mbox/%[email protected]%3E

http://mail-archives.apache.org/mod_mbox/tomcat-announce/201108.mbox/%[email protected]%3E

http://marc.info/?l=bugtraq&m=132215163318824&w=2

http://marc.info/?l=bugtraq&m=133469267822771&w=2

http://marc.info/?l=bugtraq&m=136485229118404&w=2

http://marc.info/?l=bugtraq&m=139344343412337&w=2

http://people.apache.org/~markt/patches/2011-08-12-cve2011-2729-tc5.patch

http://secunia.com/advisories/46030

http://secunia.com/advisories/57126

http://securitytracker.com/id?1025925

http://svn.apache.org/viewvc?view=revision&revision=1152701

http://svn.apache.org/viewvc?view=revision&revision=1153379

http://svn.apache.org/viewvc?view=revision&revision=1153824

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://tomcat.apache.org/security-7.html

http://www.redhat.com/support/errata/RHSA-2011-1291.html

http://www.redhat.com/support/errata/RHSA-2011-1292.html

http://www.securityfocus.com/archive/1/519263/100/0/threaded

http://www.securityfocus.com/bid/49143

https://bugzilla.redhat.com/show_bug.cgi?id=730400

https://exchange.xforce.ibmcloud.com/vulnerabilities/69161

https://issues.apache.org/jira/browse/DAEMON-214

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14743

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19450

Details

Source: MITRE

Published: 2011-08-15

Updated: 2019-03-25

Type: CWE-264

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

AND

OR

cpe:2.3:a:apache:apache_commons_daemon:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2

AND

OR

cpe:2.3:a:apache:apache_commons_daemon:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:a:apache:apache_commons_daemon:1.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:apache_commons_daemon:1.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
75868openSUSE Security Update : jakarta-commons-daemon (openSUSE-SU-2011:1062-1)NessusSuSE Local Security Checks
medium
59677GLSA-201206-24 : Apache Tomcat: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
57271Ubuntu 11.04 / 11.10 : commons-daemon vulnerability (USN-1298-1)NessusUbuntu Local Security Checks
medium
56301Apache Tomcat 5.5.x < 5.5.34 Multiple VulnerabilitiesNessusWeb Servers
high
800602Apache Tomcat 6.0.x < 6.0.33 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium
6018Apache Tomcat 6.0.x < 6.0.33 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
56008Apache Tomcat 6.0.x < 6.0.33 Multiple VulnerabilitiesNessusWeb Servers
medium
55988Fedora 15 : apache-commons-daemon-1.0.7-1.fc15 (2011-10936)NessusFedora Local Security Checks
medium
55962Fedora 16 : apache-commons-daemon-1.0.7-1.fc16 (2011-10880)NessusFedora Local Security Checks
medium
800615Apache Tomcat 7.0.x < 7.0.20 'jsvc' Information DisclosureLog Correlation EngineWeb Servers
medium
6007Apache Tomcat 7.0.x < 7.0.20 'jsvc' Information DisclosureNessus Network MonitorWeb Servers
medium
55859Apache Tomcat 7.x < 7.0.20 'jsvc' Information DisclosureNessusWeb Servers
medium