6.4
CVSSv2

CVE-2011-3602

Published: 27/04/2014 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) prior to 1.8.2 allows local users to overwrite arbitrary files, and remote malicious users to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files.

Vulnerable Product Search on Vulmon Subscribe to Product

litech router advertisement daemon

Vendor Advisories

radvd could be made to crash or overwrite certain files if it received specially crafted network traffic ...
Debian Bug report logs - #644614 multiple security issues in radvd 16 Package: radvd; Maintainer for radvd is Geert Stappers <stappers@debianorg>; Source for radvd is src:radvd (PTS, buildd, popcon) Reported by: Yves-Alexis Perez <corsac@debianorg> Date: Fri, 7 Oct 2011 11:36:26 UTC Severity: grave Tags: securit ...
Multiple security issues were discovered by Vasiliy Kulikov in radvd, an IPv6 Router Advertisement daemon: CVE-2011-3602 set_interface_var() function doesn't check the interface name, which is chosen by an unprivileged user This could lead to an arbitrary file overwrite if the attacker has local access, or specific files overwrites ot ...