CVE-2001-0635
CVSS4.6
发布时间 :2001-08-14 00:00:00
修订时间 :2008-09-05 16:24:35
NMCO    

[原文]Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords.


[CNNVD]Red Hat Linux敏感信息读取漏洞(CNNVD-200108-085)

        Red Hat Linux 7.1版本在安装时对创建的交换文件设置不安全许可,本地攻击者可以通过读取来自交换文件的敏感信息,例如:密码,来提升额外的特权。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0635
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0635
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200108-085
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2001-058.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2001:058
http://xforce.iss.net/static/6493.php
(UNKNOWN)  XF  mount-swap-world-readable(6493)
http://www.osvdb.org/5564
(UNKNOWN)  OSVDB  5564

- 漏洞信息

Red Hat Linux敏感信息读取漏洞
中危 未知
2001-08-14 00:00:00 2005-05-02 00:00:00
本地  
        Red Hat Linux 7.1版本在安装时对创建的交换文件设置不安全许可,本地攻击者可以通过读取来自交换文件的敏感信息,例如:密码,来提升额外的特权。

- 公告与补丁

        

- 漏洞信息

5564
Red Hat Linux swap File Information Disclosure
Local Access Required Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

RedHat Linux contains a flaw that may lead to an unauthorized information disclosure. When a user requests swap files be created during updates, the files are created with world readable permissions. There is a potential that these swap files may contain passwords or other sensitive information. An attacker can access these files resulting in a loss of confidentiality.

- 时间线

2001-05-02 Unknow
2001-05-02 Unknow

- 解决方案

Upgrade to losetup-2.11b-3.i386.rpm and mount-2.11b-3.i386.rpm or higher, as the combination has been reported to fix this vulnerability. It is also possible to correct the flaw by manually setting restricted read permissions to the temporary files.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站