The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
References
Link | Resource |
---|---|
https://security-tracker.debian.org/tracker/CVE-2011-2910 | Third Party Advisory |
https://access.redhat.com/security/cve/cve-2011-2910 | Broken Link |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2910 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2019-11-15 17:15
Updated : 2019-11-26 15:08
NVD link : CVE-2011-2910
Mitre link : CVE-2011-2910
JSON object : View
Products Affected
debian
- debian_linux
linux-ax25
- ax25-tools
CWE
CWE-269
Improper Privilege Management