Vulnerability Details : CVE-2011-1075
FreeBSD's crontab calculates the MD5 sum of the previous and new cronjob to determine if any changes have been made before copying the new version in. In particular, it uses the MD5File() function, which takes a pathname as an argument, and is called with euid 0. A race condition in this process may lead to an arbitrary MD5 comparison regardless of the read permissions.
Products affected by CVE-2011-1075
- cpe:2.3:o:freebsd:freebsd:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1075
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1075
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST | |
3.7
|
LOW | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N |
2.2
|
1.4
|
NIST |
CWE ids for CVE-2011-1075
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2011-1075
-
https://www.openwall.com/lists/oss-security/2011/02/28/14
oss-security - Re: CVE request: FreeBSD/OS X crontab information leakageMailing List;Third Party Advisory
-
https://marc.info/?l=full-disclosure&m=129891323028897&w=2
'[Full-disclosure] FreeBSD crontab information leakage' - MARCThird Party Advisory
-
https://security.netapp.com/advisory/ntap-20211125-0004/
CVE-2011-1075 FreeBSD Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
Jump to