6.9
CVSSv2

CVE-2019-11675

Published: 02/05/2019 Updated: 03/05/2019
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7 | Impact Score: 5.9 | Exploitability Score: 1
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The groonga-httpd package 6.1.5-1 for Debian sets the /var/log/groonga ownership to the groonga account, which might let local users obtain root access because of unsafe interaction with logrotate. For example, an attacker can exploit a race condition to insert a symlink from /var/log/groonga/httpd to /etc/bash_completion.d. NOTE: this is an issue in the Debian packaging of the Groonga HTTP server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

groonga groonga-httpd 6.5.1-1

Vendor Advisories

Debian Bug report logs - #928304 groonga-httpd: Privilege escalation due to insecure use of logrotate (CVE-2019-11675) Package: groonga-httpd; Maintainer for groonga-httpd is Groonga Project <packages@groongaorg>; Source for groonga-httpd is src:groonga (PTS, buildd, popcon) Reported by: Wolfgang Hotwagner <sec@feedyourh ...