CVE-2009-0115

The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:christophe.varoqui:multipath-tools:0.4.8:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:avaya:intuity_audix_lx:2.0:-:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp1:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp2:*:*:*:*:*:*
cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:*
cpe:2.3:a:avaya:messaging_storage_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:avaya:messaging_storage_server:5.0:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:*
cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:*

History

16 Feb 2024, 20:28

Type Values Removed Values Added
First Time Avaya intuity Audix Lx
Debian
Suse
Novell
Avaya message Networking
Opensuse
Novell open Enterprise Server
Suse linux Enterprise Desktop
Juniper
Fedoraproject
Fedoraproject fedora
Suse linux Enterprise Server
Opensuse opensuse
Avaya messaging Storage Server
Juniper ctpview
Avaya
Debian debian Linux
CWE CWE-264 CWE-732
CPE cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix_lx:2.0:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:9:*:*:*:*:*:*:*
cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp1:*:*:*:*:*:*
cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp2:*:*:*:*:*:*
cpe:2.3:a:avaya:messaging_storage_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:*
cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:*
cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:*
cpe:2.3:a:avaya:messaging_storage_server:3.0:*:*:*:*:*:*:*
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8
References () http://download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml - Exploit () http://download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml - Broken Link, Exploit
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691 - Third Party Advisory
References () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - () http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - Third Party Advisory
References () http://launchpad.net/bugs/cve/2009-0115 - () http://launchpad.net/bugs/cve/2009-0115 - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html - () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html - Mailing List
References () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - () http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html - Mailing List
References () http://lists.vmware.com/pipermail/security-announce/2010/000082.html - () http://lists.vmware.com/pipermail/security-announce/2010/000082.html - Broken Link
References () http://secunia.com/advisories/34418 - Vendor Advisory () http://secunia.com/advisories/34418 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/34642 - Vendor Advisory () http://secunia.com/advisories/34642 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/34694 - Vendor Advisory () http://secunia.com/advisories/34694 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/34710 - Vendor Advisory () http://secunia.com/advisories/34710 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/34759 - Vendor Advisory () http://secunia.com/advisories/34759 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/38794 - Vendor Advisory () http://secunia.com/advisories/38794 - Broken Link, Vendor Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2009-128.htm - () http://support.avaya.com/elmodocs2/security/ASA-2009-128.htm - Third Party Advisory
References () http://www.debian.org/security/2009/dsa-1767 - () http://www.debian.org/security/2009/dsa-1767 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2010/0528 - () http://www.vupen.com/english/advisories/2010/0528 - Permissions Required
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9214 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9214 - Broken Link
References () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00231.html - () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00231.html - Mailing List
References () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00236.html - () https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00236.html - Mailing List

Information

Published : 2009-03-30 16:30

Updated : 2024-02-16 20:28


NVD link : CVE-2009-0115

Mitre link : CVE-2009-0115

CVE.ORG link : CVE-2009-0115


JSON object : View

Products Affected

fedoraproject

  • fedora

avaya

  • message_networking
  • messaging_storage_server
  • intuity_audix_lx

suse

  • linux_enterprise_server
  • linux_enterprise_desktop

novell

  • open_enterprise_server

opensuse

  • opensuse

debian

  • debian_linux

juniper

  • ctpview

christophe.varoqui

  • multipath-tools
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource