VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-4176
dracut, udev: plymouth-pretrigger.sh in dracut and udev, when run...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4176

Original

plymouth-pretrigger.sh in dracut and udev, when running on Fedora 13 and 14, sets insecure permissions for the /dev/systty device file, which allows remote authenticated users to read terminal data from tty0 for local users.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-12-07
Source Information Category:
Advisory, Alert
Last Updated:
2010-12-08




Affected Product Tags
cpe:/a:fedoraproject:dracut
cpe:/a:kernel:udev:0.0.1
cpe:/a:kernel:udev:0.0.2
cpe:/a:kernel:udev:0.0.3
cpe:/a:kernel:udev:0.0.4
cpe:/a:kernel:udev:0.0.4-1
cpe:/a:kernel:udev:0.0.5
cpe:/a:kernel:udev:0.0.5-1
cpe:/a:kernel:udev:0.0.6
cpe:/a:kernel:udev:0.0.7
cpe:/a:kernel:udev:0.0.8
cpe:/a:kernel:udev:0.0.8-1
cpe:/a:kernel:udev:0.0.9
cpe:/a:kernel:udev:0.0.9-1
cpe:/a:kernel:udev:0.1.0-1
cpe:/a:kernel:udev:0.1.1-1
cpe:/a:kernel:udev:0.1.2
cpe:/a:kernel:udev:0.1.3
cpe:/a:kernel:udev:0.1.4
cpe:/a:kernel:udev:0.1.5
cpe:/a:kernel:udev:0.1.6
cpe:/a:kernel:udev:0.1.7
cpe:/a:kernel:udev:0.1.8
cpe:/a:kernel:udev:0.1.9
cpe:/a:kernel:udev:0.2.0
cpe:/a:kernel:udev:0.2.1
cpe:/a:kernel:udev:0.2.2
cpe:/a:kernel:udev:0.2.3
cpe:/a:kernel:udev:0.2.4
cpe:/a:kernel:udev:0.2.5
cpe:/a:kernel:udev:0.2.6
cpe:/a:kernel:udev:0.2.7
cpe:/a:kernel:udev:0.2.8
cpe:/a:kernel:udev:0.2.9
cpe:/a:kernel:udev:0.3.0
cpe:/a:kernel:udev:0.3.1
cpe:/a:kernel:udev:0.3.2
cpe:/a:kernel:udev:0.3.3
cpe:/a:kernel:udev:0.3.4
cpe:/a:kernel:udev:0.3.5
cpe:/a:kernel:udev:0.3.6
cpe:/a:kernel:udev:0.3.7
cpe:/a:kernel:udev:0.3.8
cpe:/a:kernel:udev:0.3.9
cpe:/a:kernel:udev:0.4.0
cpe:/a:kernel:udev:0.4.2
cpe:/a:kernel:udev:0.4.3
cpe:/a:kernel:udev:0.4.4
cpe:/a:kernel:udev:0.4.5
cpe:/a:kernel:udev:0.4.6
cpe:/a:kernel:udev:0.4.7
cpe:/a:kernel:udev:0.4.8
cpe:/a:kernel:udev:0.4.9
cpe:/a:kernel:udev:0.5.0
cpe:/a:kernel:udev:0.5.1
cpe:/a:kernel:udev:0.5.2
cpe:/a:kernel:udev:0.5.3
cpe:/a:kernel:udev:0.5.4
cpe:/a:kernel:udev:0.5.5
cpe:/a:kernel:udev:0.5.6
cpe:/a:kernel:udev:0.5.7
cpe:/a:kernel:udev:0.5.8
cpe:/a:kernel:udev:0.5.9
cpe:/a:kernel:udev:0.6.0
cpe:/a:kernel:udev:0.6.1
cpe:/a:kernel:udev:0.6.2
cpe:/a:kernel:udev:0.6.3
cpe:/a:kernel:udev:0.6.4
cpe:/a:kernel:udev:0.6.5
cpe:/a:kernel:udev:0.6.6
cpe:/a:kernel:udev:0.6.7
cpe:/a:kernel:udev:0.6.8
cpe:/a:kernel:udev:0.6.9
cpe:/a:kernel:udev:0.7.0
cpe:/a:kernel:udev:0.7.1
cpe:/a:kernel:udev:0.7.2
cpe:/a:kernel:udev:0.7.3
cpe:/a:kernel:udev:0.7.4
cpe:/a:kernel:udev:0.7.5
cpe:/a:kernel:udev:0.7.6
cpe:/a:kernel:udev:0.7.7
cpe:/a:kernel:udev:0.7.8
cpe:/a:kernel:udev:0.7.9
cpe:/a:kernel:udev:0.8.0
cpe:/a:kernel:udev:0.8.1
cpe:/a:kernel:udev:0.8.2
cpe:/a:kernel:udev:0.8.3
cpe:/a:kernel:udev:0.8.4
cpe:/a:kernel:udev:0.8.5
cpe:/a:kernel:udev:0.8.6
cpe:/a:kernel:udev:0.8.7
cpe:/a:kernel:udev:0.8.8
cpe:/a:kernel:udev:0.8.9
cpe:/a:kernel:udev:0.9.0
cpe:/a:kernel:udev:0.9.1
cpe:/a:kernel:udev:0.9.2
cpe:/a:kernel:udev:0.9.3
cpe:/a:kernel:udev:0.9.4
cpe:/a:kernel:udev:0.9.5
cpe:/a:kernel:udev:0.9.6
cpe:/a:kernel:udev:0.9.7
cpe:/a:kernel:udev:0.9.8
cpe:/a:kernel:udev:0.9.9
cpe:/a:kernel:udev:1.0.0
cpe:/a:kernel:udev:1.0.1
cpe:/a:kernel:udev:1.0.2
cpe:/a:kernel:udev:1.0.3
cpe:/a:kernel:udev:1.0.4
cpe:/a:kernel:udev:1.0.5
cpe:/a:kernel:udev:1.0.6
cpe:/a:kernel:udev:1.0.7
cpe:/a:kernel:udev:1.0.8
cpe:/a:kernel:udev:1.0.9
cpe:/a:kernel:udev:1.1.0
cpe:/a:kernel:udev:1.1.1
cpe:/a:kernel:udev:1.1.2
cpe:/a:kernel:udev:1.1.3
cpe:/a:kernel:udev:1.1.4
cpe:/a:kernel:udev:1.1.5
cpe:/a:kernel:udev:1.1.6
cpe:/a:kernel:udev:1.1.7
cpe:/a:kernel:udev:1.1.8
cpe:/a:kernel:udev:1.1.9
cpe:/a:kernel:udev:1.2.0
cpe:/a:kernel:udev:1.2.1
cpe:/a:kernel:udev:1.2.2
cpe:/a:kernel:udev:1.2.3
cpe:/a:kernel:udev:1.2.4
cpe:/a:kernel:udev:1.2.5
cpe:/a:kernel:udev:1.2.6
cpe:/a:kernel:udev:1.2.7
cpe:/a:kernel:udev:1.2.8
cpe:/a:kernel:udev:1.2.9
cpe:/a:kernel:udev:1.3.0
cpe:/a:kernel:udev:1.3.1
cpe:/a:kernel:udev:1.3.2
cpe:/a:kernel:udev:1.3.3
cpe:/a:kernel:udev:1.3.4
cpe:/a:kernel:udev:1.3.5
cpe:/a:kernel:udev:1.3.6
cpe:/a:kernel:udev:1.3.7
cpe:/a:kernel:udev:1.3.8
cpe:/a:kernel:udev:1.3.9
cpe:/a:kernel:udev:1.4.0
cpe:/o:redhat:fedora:13
cpe:/o:redhat:fedora:14
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
Medium [?]
X Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
X Single [?]
None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

X None [?]
Partial [?]
Complete [?]

Alternatives




References
BID 45046




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=654935




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=654489




FEDORA FEDORA-2010-17930




FEDORA FEDORA-2010-17912




SECUNIA 42451




SECUNIA 42342




VUPEN ADV-2010-3110




VUPEN ADV-2010-3062




Vulnerability Type Permissions, Privileges, and Access Control (CWE-264)





Copyright © 2010 JPCERT/CC All Rights Reserved.