Maynard Johnson OProfile up to 0.9.6 do_dump_data --session-dir link following
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.4 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Maynard Johnson OProfile. Affected by this vulnerability is the function do_dump_data. Executing a manipulation of the argument --session-dir can lead to link following.
This vulnerability is registered as CVE-2011-2473. No exploit is available.
You should upgrade the affected component.
Details
A vulnerability has been found in Maynard Johnson OProfile and classified as critical. This vulnerability affects the function do_dump_data. The manipulation of the argument --session-dir with an unknown input leads to a link following vulnerability. The CWE definition for the vulnerability is CWE-59. The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource. As an impact it is known to affect integrity, and availability. CVE summarizes:
The do_dump_data function in utils/opcontrol in OProfile 0.9.6 and earlier might allow local users to create or overwrite arbitrary files via a crafted --session-dir argument in conjunction with a symlink attack on the opd_pipe file, a different vulnerability than CVE-2011-1760.
The weakness was published 06/09/2011 (oss-sec). The advisory is shared for download at openwall.com. This vulnerability was named CVE-2011-2473 since 06/09/2011. The attack needs to be approached locally. No form of authentication is required for a successful exploitation. There are known technical details, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 79962 (GLSA-201412-09 : Multiple packages, Multiple vulnerabilities fixed in 2011), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Gentoo Local Security Checks and running in the context l.
Upgrading eliminates this vulnerability. A possible mitigation has been published 4 years after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (67978), Tenable (79962) and SecurityFocus (BID 25297†). Similar entries are available at VDB-38354, VDB-55173, VDB-58817 and VDB-57639. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.7VulDB Meta Temp Score: 7.4
VulDB Base Score: 7.7
VulDB Temp Score: 7.4
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Link followingCWE: CWE-59
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 79962
Nessus Name: GLSA-201412-09 : Multiple packages, Multiple vulnerabilities fixed in 2011
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 802108
OpenVAS Name: OProfile Multiple Vulnerabilities
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Timeline
06/09/2011 🔍06/09/2011 🔍
06/09/2011 🔍
12/11/2014 🔍
12/15/2014 🔍
03/23/2015 🔍
11/08/2021 🔍
Sources
Advisory: dsa-2254Status: Not defined
Confirmation: 🔍
CVE: CVE-2011-2473 (🔍)
GCVE (CVE): GCVE-0-2011-2473
GCVE (VulDB): GCVE-100-57640
X-Force: 67978
SecurityFocus: 25297
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 11/08/2021 14:21
Changes: 03/23/2015 16:50 (63), 02/09/2019 11:11 (3), 11/08/2021 14:17 (3), 11/08/2021 14:21 (1)
Complete: 🔍
Cache ID: 216::103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.