Vulnerability Description
The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, uses world-readable permissions for vmcore files, which allows local users to obtain sensitive information by inspecting the file content, as demonstrated by a search for a root SSH key.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Kexec-Tools | <= 1.102pre-126 |
Related Weaknesses (CWE)
References
- http://rhn.redhat.com/errata/RHSA-2011-1532.html
- http://rhn.redhat.com/errata/RHSA-2012-0152.html
- https://bugzilla.redhat.com/show_bug.cgi?id=716439Vendor Advisory
- http://rhn.redhat.com/errata/RHSA-2011-1532.html
- http://rhn.redhat.com/errata/RHSA-2012-0152.html
- https://bugzilla.redhat.com/show_bug.cgi?id=716439Vendor Advisory
FAQ
What is CVE-2011-3589?
CVE-2011-3589 is a vulnerability with a CVSS score of 5.7 (MEDIUM). The Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, uses world-readable permissions fo...
How severe is CVE-2011-3589?
CVE-2011-3589 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3589?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Kexec-Tools.