Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2009-0115
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 7.2/10
- Exploit Score
- 3.9/10
- Access Vector
- Local
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
CVSSv3.1 Score
- Severity
- High
- Base Score
- 7.8/10
- Exploit Score
- 1.8/10
- Access Vector
- Local
- Access Complexity
- Low
- Privileges Required
- Low
- Impact Score
- 5.9/10
- Confidentiality Impact
- High
- Availability Impact
- High
- Integrity Impact
- High
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:christophe.varoqui:multipath-tools:0.4.8:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:avaya:message_networking:3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:avaya:messaging_storage_server:4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:avaya:intuity_audix_lx:2.0:sp2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:avaya:intuity_audix_lx:2.0:-:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:avaya:messaging_storage_server:3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:avaya:messaging_storage_server:5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:* |
Yes
|
10.3 | - | |
cpe:2.3:o:suse:linux_enterprise_desktop:9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:linux_enterprise_server:10:-:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:novell:open_enterprise_server:-:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:juniper:ctpview:*:*:*:*:*:*:*:* |
Yes
|
- | 7.1 | |
cpe:2.3:a:juniper:ctpview:7.1:-:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://secunia.com/advisories/34418
- http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
- http://download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml
- http://launchpad.net/bugs/cve/2009-0115
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
- http://www.debian.org/security/2009/dsa-1767
- https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00236.html
- http://secunia.com/advisories/34694
- http://secunia.com/advisories/34710
- http://secunia.com/advisories/34642
- https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00231.html
- http://support.avaya.com/elmodocs2/security/ASA-2009-128.htm
- http://secunia.com/advisories/34759
- http://www.vupen.com/english/advisories/2010/0528
- http://secunia.com/advisories/38794
- http://lists.vmware.com/pipermail/security-announce/2010/000082.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10691
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9