| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 3.5 | $0-$5k | 0.00 |
Summary
A vulnerability identified as problematic has been detected in FreeBSD. This affects an unknown part of the file crontab.c of the component crontab. Performing a manipulation results in link following. This vulnerability is identified as CVE-2011-1073. There is not any exploit available.
Details
A vulnerability was found in FreeBSD (Operating System) (affected version not known). It has been classified as problematic. This affects some unknown functionality of the file crontab.c of the component crontab. The manipulation with an unknown input leads to a link following vulnerability. CWE is classifying the issue as CWE-59. The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. This is going to have an impact on confidentiality. The summary by CVE is:
crontab.c in crontab in FreeBSD and Apple Mac OS X allows local users to (1) determine the existence of arbitrary files via a symlink attack on a /tmp/crontab.XXXXXXXXXX temporary file and (2) perform MD5 checksum comparisons on arbitrary pairs of files via two symlink attacks on /tmp/crontab.XXXXXXXXXX temporary files.
The weakness was released 03/04/2011 by Dan Rosenberg (Website). It is possible to read the advisory at securityfocus.com. This vulnerability is uniquely identified as CVE-2011-1073 since 02/24/2011. Attacking locally is a requirement. No form of authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 01/09/2018).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at X-Force (65899) and SecurityFocus (BID 46604†). Entry connected to this vulnerability is available at VDB-56752. Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Name
License
Website
- Product: https://www.freebsd.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.0VulDB Meta Temp Score: 3.5
VulDB Base Score: 4.0
VulDB Temp Score: 3.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Link followingCWE: CWE-59
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
02/24/2011 🔍02/28/2011 🔍
03/04/2011 🔍
03/04/2011 🔍
03/20/2015 🔍
01/09/2018 🔍
Sources
Product: freebsd.orgAdvisory: securityfocus.com⛔
Researcher: Dan Rosenberg
Status: Not defined
CVE: CVE-2011-1073 (🔍)
GCVE (CVE): GCVE-0-2011-1073
GCVE (VulDB): GCVE-100-56751
X-Force: 65899 - FreeBSD realpath() information disclosure
SecurityFocus: 46604 - FreeBSD Crontab Multiple Information Disclosure Vulnerabilities
See also: 🔍
Entry
Created: 03/20/2015 16:16Updated: 01/09/2018 15:33
Changes: 03/20/2015 16:16 (50), 01/09/2018 15:33 (5)
Complete: 🔍
Cache ID: 216:49C:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.