6.9
CVE-2008-4832
- EPSS 0.02%
- Veröffentlicht 17.11.2008 23:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
rc.sysinit in initscripts 8.12-8.21 and 8.56.15-0.1 on rPath allows local users to delete arbitrary files via a symlink attack on a directory under (1) /var/lock or (2) /var/run. NOTE: this issue exists because of a race condition in an incorrect fix for CVE-2008-3524. NOTE: exploitation may require an unusual scenario in which rc.sysinit is executed other than at boot time.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rpath ≫ Initscripts Version8.12-8.21
Rpath ≫ Appliance Platform Linux Service Version1
Rpath ≫ Appliance Platform Linux Service Version2
Rpath ≫ Linux Version1
Rpath ≫ Linux Version2
Rpath ≫ Appliance Platform Linux Service Version2
Rpath ≫ Linux Version1
Rpath ≫ Linux Version2
Rpath ≫ Initscripts Version8.56.15-0.1
Rpath ≫ Appliance Platform Linux Service Version1
Rpath ≫ Appliance Platform Linux Service Version2
Rpath ≫ Linux Version1
Rpath ≫ Linux Version2
Rpath ≫ Appliance Platform Linux Service Version2
Rpath ≫ Linux Version1
Rpath ≫ Linux Version2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.03 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.9 | 3.4 | 10 |
AV:L/AC:M/Au:N/C:C/I:C/A:C
|
CWE-59 Improper Link Resolution Before File Access ('Link Following')
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.