CVE-2011-2910
Published: 15 November 2019
The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
Priority
Status
Package | Release | Status |
---|---|---|
ax25-tools
Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(0.0.8-13.2)
|
|
quantal |
Not vulnerable
(0.0.8-13.2)
|
|
raring |
Not vulnerable
(0.0.8-13.2)
|
|
saucy |
Not vulnerable
(0.0.8-13.2)
|
|
upstream |
Released
(0.0.8-13.2)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.7 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |