Vulnerability Description
Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrary processes by writing a PID to a file, or possibly bypass disk quotas by writing arbitrary data to a file, as demonstrated by files with 0666 permissions, a different vulnerability than CVE-2011-1784.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openswan | Openswan | 2.2.0 |
Related Weaknesses (CWE)
References
- http://lists.debian.org/debian-security/2011/05/msg00012.html
- http://lists.debian.org/debian-security/2011/05/msg00013.html
- http://lists.debian.org/debian-security/2011/05/msg00018.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67822
- http://lists.debian.org/debian-security/2011/05/msg00012.html
- http://lists.debian.org/debian-security/2011/05/msg00013.html
- http://lists.debian.org/debian-security/2011/05/msg00018.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67822
FAQ
What is CVE-2011-2147?
CVE-2011-2147 is a vulnerability with a CVSS score of 3.6 (LOW). Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrar...
How severe is CVE-2011-2147?
CVE-2011-2147 has been rated LOW with a CVSS base score of 3.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2147?
Check the references section above for vendor advisories and patch information. Affected products include: Openswan Openswan.