4.6
CVSSv2

CVE-2011-4578

Published: 29/08/2012 Updated: 05/04/2013
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

event.c in acpid (aka acpid2) prior to 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via standard filesystem system calls.

Vulnerable Product Search on Vulmon Subscribe to Product

tedfelix acpid2

tedfelix acpid2 2.0.3

tedfelix acpid2 2.0.2

tedfelix acpid2 2.0.9

tedfelix acpid2 2.0.8

tedfelix acpid2 2.0.1

tedfelix acpid2 2.0.0

tedfelix acpid2 2.0.7

tedfelix acpid2 2.0.6

tedfelix acpid2 2.0.5

tedfelix acpid2 2.0.4

Vendor Advisories

Several security issues were fixed in acpid ...
Multiple vulnerabilities were found in the ACPI Daemon, the Advanced Configuration and Power Interface event daemon: CVE-2011-1159 Vasiliy Kulikov of OpenWall discovered that the socket handling is vulnerable to denial of service CVE-2011-2777 Oliver-Tobias Ripka discovered that incorrect process handling in the Debian-specific po ...