Executive Summary

Informations
Name CVE-2011-4578 First vendor Publication 2012-08-29
Vendor Cve Last vendor Modification 2013-04-05

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.6 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

event.c in acpid (aka acpid2) before 2.0.11 does not have an appropriate umask setting during execution of event-handler scripts, which might allow local users to (1) perform write operations within directories created by a script, or (2) read files created by a script, via standard filesystem system calls.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4578

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:15149
 
Oval ID: oval:org.mitre.oval:def:15149
Title: DSA-2362-1 acpid -- several
Description: Multiple vulnerabilities were found in the acpid, the Advanced Configuration and Power Interface event daemon: CVE-2011-1159 Vasiliy Kulikov of OpenWall discovered that the socket handling is vulnerable to denial of service. CVE-2011-2777 Oliver-Tobias Ripka discovered that incorrect process handling in the Debian-specific powerbtn.sh script could lead to local privilege escalation. This issue doesn't affect oldstable. The script is only shipped as an example in /usr/share/doc/acpid/examples. See /usr/share/doc/acpid/README.Debian for details. CVE-2011-4578 Helmut Grohne and Michael Biebl discovered that acpid sets a umask of 0 when executing scripts, which could result in local privilege escalation.
Family: unix Class: patch
Reference(s): DSA-2362-1
CVE-2011-1159
CVE-2011-2777
CVE-2011-4578
Version: 5
Platform(s): Debian GNU/Linux 5.0
Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): acpid
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:15207
 
Oval ID: oval:org.mitre.oval:def:15207
Title: USN-1296-1 -- acpid vulnerabilities
Description: acpid: Advanced Configuration and Power Interface daemon Several security issues were fixed in acpid.
Family: unix Class: patch
Reference(s): USN-1296-1
CVE-2011-2777
CVE-2011-4578
Version: 5
Platform(s): Ubuntu 11.04
Ubuntu 11.10
Ubuntu 10.04
Ubuntu 10.10
Product(s): acpid
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 11

OpenVAS Exploits

Date Description
2012-08-21 Name : Mandriva Update for acpid MDVSA-2012:137 (acpid)
File : nvt/gb_mandriva_MDVSA_2012_137.nasl
2012-02-11 Name : Debian Security Advisory DSA 2362-1 (acpid)
File : nvt/deb_2362_1.nasl
2011-12-09 Name : Ubuntu Update for acpid USN-1296-1
File : nvt/gb_ubuntu_USN_1296_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
77557 acpid Event Scripts Insecure umask Local Information Disclosure

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : openSUSE-2012-55.nasl - Type : ACT_GATHER_INFO
2012-09-06 Name : The remote Mandriva Linux host is missing a security update.
File : mandriva_MDVSA-2012-137.nasl - Type : ACT_GATHER_INFO
2012-01-12 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2362.nasl - Type : ACT_GATHER_INFO
2011-12-09 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-1296-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b1...
https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821
https://bugzilla.redhat.com/show_bug.cgi?id=760984
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2012:138
MLIST http://www.openwall.com/lists/oss-security/2011/12/06/3

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 12:17:55
  • Multiple Updates
2021-04-22 01:21:12
  • Multiple Updates
2020-05-23 01:47:34
  • Multiple Updates
2020-05-23 00:32:16
  • Multiple Updates
2016-04-26 21:15:25
  • Multiple Updates
2014-06-14 13:31:59
  • Multiple Updates
2014-02-17 11:06:21
  • Multiple Updates
2013-05-10 23:11:02
  • Multiple Updates
2013-04-05 13:18:40
  • Multiple Updates