6.9

CVE-2008-4832

rc.sysinit in initscripts 8.12-8.21 and 8.56.15-0.1 on rPath allows local users to delete arbitrary files via a symlink attack on a directory under (1) /var/lock or (2) /var/run.  NOTE: this issue exists because of a race condition in an incorrect fix for CVE-2008-3524. NOTE: exploitation may require an unusual scenario in which rc.sysinit is executed other than at boot time.

Data is provided by the National Vulnerability Database (NVD)
RpathInitscripts Version8.12-8.21
   RpathAppliance Platform Linux Service Version1
   RpathAppliance Platform Linux Service Version2
   RpathLinux Version1
   RpathLinux Version2
RpathInitscripts Version8.56.15-0.1
   RpathAppliance Platform Linux Service Version1
   RpathAppliance Platform Linux Service Version2
   RpathLinux Version1
   RpathLinux Version2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.03
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.