Vulnerability Details : CVE-2008-4579
The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.
Products affected by CVE-2008-4579
- cpe:2.3:a:gentoo:fence:2.02.00:r1:*:*:*:*:*:*
- cpe:2.3:a:gentoo:cman:2.02.00:r1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4579
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4579
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
1.9
|
LOW | AV:L/AC:M/Au:N/C:N/I:P/A:N |
3.4
|
2.9
|
NIST |
CWE ids for CVE-2008-4579
-
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-4579
-
Red Hat 2009-09-02The Red Hat Security Response Team has rated this issue as having low security impact. This issue is addressed in the cman package for Red Hat Enterprise Linux 5: https://rhn.redhat.com/errata/RHSA-2009-1337.html This issue also affects the fence package in Red Hat Cluster Suite for Enterprise Linux 4AS, a future update may address this flaw: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-4579
References for CVE-2008-4579
-
http://www.ubuntu.com/usn/USN-875-1
-
http://www.redhat.com/support/errata/RHSA-2009-1341.html
-
http://www.securityfocus.com/bid/31904
-
https://bugzilla.redhat.com/show_bug.cgi?id=467386
-
http://www.vupen.com/english/advisories/2011/0419
-
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00666.html
-
http://www.openwall.com/lists/oss-security/2008/10/13/3
-
http://www.redhat.com/support/errata/RHSA-2011-0266.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10799
-
http://bugs.gentoo.org/show_bug.cgi?id=240576
Jump to