6.9
CVSSv2

CVE-2009-4033

Published: 08/12/2009 Updated: 19/09/2017
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.

Vulnerable Product Search on Vulmon Subscribe to Product

tim hockin acpid 1.0.4

Vendor Advisories

Debian Bug report logs - #560771 acpid: CVE-2009-4235: weak permissions on /var/log/acpid Package: acpid; Maintainer for acpid is Debian Acpi Team <pkg-acpi-devel@listsaliothdebianorg>; Source for acpid is src:acpid (PTS, buildd, popcon) Reported by: Raphael Geissert <geissert@debianorg> Date: Sat, 12 Dec 2009 03 ...