Vulnerability Description
openhpi/Makefile.am in OpenHPI before 3.6.0 uses world-writable permissions for /var/lib/openhpi directory, which allows local users, when quotas are not properly setup, to fill the filesystem hosting /var/lib and cause a denial of service (disk consumption).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openhpi | Openhpi | <= 3.5.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168841.htThird Party Advisory
- http://openhpi.org/Changelogs/3.6.0Release NotesVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1233521Issue TrackingThird Party AdvisoryVDB Entry
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168841.htThird Party Advisory
- http://openhpi.org/Changelogs/3.6.0Release NotesVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=1233521Issue TrackingThird Party AdvisoryVDB Entry
FAQ
What is CVE-2015-3248?
CVE-2015-3248 is a vulnerability with a CVSS score of 4.7 (MEDIUM). openhpi/Makefile.am in OpenHPI before 3.6.0 uses world-writable permissions for /var/lib/openhpi directory, which allows local users, when quotas are not properly setup, to fill the filesystem hosting...
How severe is CVE-2015-3248?
CVE-2015-3248 has been rated MEDIUM with a CVSS base score of 4.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3248?
Check the references section above for vendor advisories and patch information. Affected products include: Openhpi Openhpi.