Vulnerability Description
The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which allows local users to cause a denial of service (daemon outage or arbitrary process termination) by replacing PID files contained in this directory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | 389 Directory Server | 1.2.1 |
| Redhat | Directory Server | 8.2 |
Related Weaknesses (CWE)
References
- http://www.redhat.com/support/errata/RHSA-2011-0293.html
- http://www.securityfocus.com/bid/46489
- http://www.securitytracker.com/id?1025102
- https://bugzilla.redhat.com/show_bug.cgi?id=671199
- http://www.redhat.com/support/errata/RHSA-2011-0293.html
- http://www.securityfocus.com/bid/46489
- http://www.securitytracker.com/id?1025102
- https://bugzilla.redhat.com/show_bug.cgi?id=671199
FAQ
What is CVE-2011-0022?
CVE-2011-0022 is a vulnerability with a CVSS score of 4.7 (MEDIUM). The setup scripts in 389 Directory Server 1.2.x (aka Red Hat Directory Server 8.2.x), when multiple unprivileged instances are configured, use 0777 permissions for the /var/run/dirsrv directory, which...
How severe is CVE-2011-0022?
CVE-2011-0022 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0022?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject 389 Directory Server, Redhat Directory Server.