Vulnerability Description
Tomcat before 5.0.27-r3 in Gentoo Linux sets the default permissions on the init scripts as tomcat:tomcat, but executes the scripts with root privileges, which could allow local users in the tomcat group to execute arbitrary commands as root by modifying the scripts.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gentoo | Linux | 0.5 |
References
- http://secunia.com/advisories/12296/Patch
- http://www.gentoo.org/security/en/glsa/glsa-200408-15.xmlPatch
- http://www.securityfocus.com/bid/10951Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16993
- http://secunia.com/advisories/12296/Patch
- http://www.gentoo.org/security/en/glsa/glsa-200408-15.xmlPatch
- http://www.securityfocus.com/bid/10951Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16993
FAQ
What is CVE-2004-1452?
CVE-2004-1452 is a vulnerability with a CVSS score of 7.2 (HIGH). Tomcat before 5.0.27-r3 in Gentoo Linux sets the default permissions on the init scripts as tomcat:tomcat, but executes the scripts with root privileges, which could allow local users in the tomcat gr...
How severe is CVE-2004-1452?
CVE-2004-1452 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1452?
Check the references section above for vendor advisories and patch information. Affected products include: Gentoo Linux.