CVE-2011-2905

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Untrusted search path vulnerability in the perf_config function in tools/perf/util/config.c in perf, as distributed in the Linux kernel before 3.1, allows local users to overwrite arbitrary files via a crafted config file in the current working directory.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=aba8d056078e47350d85b06a9cabd5afcc4b72ea

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1

http://www.openwall.com/lists/oss-security/2011/08/09/6

https://bugzilla.redhat.com/show_bug.cgi?id=729808

https://github.com/torvalds/linux/commit/aba8d056078e47350d85b06a9cabd5afcc4b72ea

Details

Source: MITRE

Published: 2013-03-01

Updated: 2013-03-04

Risk Information

CVSS v2

Base Score: 6.2

Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 1.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.44:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.45:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.46:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.47:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.48:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.49:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.50:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.51:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.52:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.53:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.54:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.55:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.56:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.57:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.58:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.59:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.60:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.61:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.62:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.63:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.64:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.65:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.66:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.67:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.0.68 (inclusive)

Tenable Plugins

View all (20 total)

IDNameProductFamilySeverity
69585Amazon Linux AMI : kernel (ALAS-2011-26)NessusAmazon Linux Local Security Checks
critical
68424Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2011-2033)NessusOracle Linux Local Security Checks
critical
68393Oracle Linux 6 : kernel (ELSA-2011-1465)NessusOracle Linux Local Security Checks
critical
61179Scientific Linux Security Update : kernel on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
critical
57127SuSE 11.1 Security Update : perf (SAT Patch Number 5417)NessusSuSE Local Security Checks
medium
56978Ubuntu 11.04 : linux vulnerabilities (USN-1285-1)NessusUbuntu Local Security Checks
high
56949USN-1281-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
high
56947Ubuntu 10.04 LTS : linux-lts-backport-natty vulnerabilities (USN-1279-1)NessusUbuntu Local Security Checks
high
56927RHEL 6 : kernel (RHSA-2011:1465)NessusRed Hat Local Security Checks
critical
56768Ubuntu 10.04 LTS : linux-lts-backport-natty vulnerabilities (USN-1256-1)NessusUbuntu Local Security Checks
critical
56747Ubuntu 10.04 LTS : linux vulnerabilities (USN-1253-1)NessusUbuntu Local Security Checks
critical
56644Ubuntu 10.10 : linux-mvl-dove vulnerabilities (USN-1245-1)NessusUbuntu Local Security Checks
critical
56643USN-1244-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
high
56642Ubuntu 10.10 : linux vulnerabilities (USN-1243-1)NessusUbuntu Local Security Checks
medium
56641Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1242-1)NessusUbuntu Local Security Checks
medium
56640USN-1241-1 : linux-fsl-imx51 vulnerabilitiesNessusUbuntu Local Security Checks
critical
56639Ubuntu 10.04 LTS : linux-mvl-dove vulnerabilities (USN-1240-1)NessusUbuntu Local Security Checks
critical
56638Ubuntu 10.04 LTS : linux-ec2 vulnerabilities (USN-1239-1)NessusUbuntu Local Security Checks
critical
56130Debian DSA-2303-2 : linux-2.6 - privilege escalation/denial of service/information leakNessusDebian Local Security Checks
critical
55955Fedora 14 : kernel-2.6.35.14-95.fc14 (2011-11103)NessusFedora Local Security Checks
high