Bug 911122 (CVE-2013-4216)
Summary: | CVE-2013-4216 wimax: Log file created with insecure (world-writable) permissions | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Florian Weimer <fweimer> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED EOL | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | dcbw, jlieskov, jrusnack, rkhan |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-02-17 16:48:27 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 995160 | ||
Bug Blocks: | 909233 |
Description
Florian Weimer
2013-02-14 12:41:13 UTC
A security flaw was found in the way Trace module of WiMAX, an user space daemon for the Intel 2400m Wireless WiMAX link, used to set permissions when opening the log file (was created with world-readable / writable permissions). A local attacker could use this flaw to, in an unauthorized way, alter the content of WiMAX daemon log file (possibly leading to un-enforced actions to be performed by system administrator). Acknowledgements: This issue was found by Florian Weimer of Red Hat Product Security Team. Created wimax tracking bugs for this issue: Affects: fedora-all [bug 995160] The CVE identifier of CVE-2013-4216 has been assigned to this issue: http://www.openwall.com/lists/oss-security/2013/08/08/17 Only Fedora 19 shipped the wimax packages, and it is now EOL. |