Vulnerability Details : CVE-2011-1006
Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application. NOTE: it is not clear whether this issue crosses privilege boundaries.
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2011-1006
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 8 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1006
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2011-1006
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1006
-
https://bugzilla.redhat.com/show_bug.cgi?id=678107
678107 – (CVE-2011-1006) CVE-2011-1006 libcgroup: Heap-based buffer overflow by converting list of controllers for given task into an array of stringsPatch
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html
[SECURITY] Fedora 15 Update: libcgroup-0.37.1-1.fc15
-
http://www.vupen.com/english/advisories/2011/0679
Webmail | OVH- OVHVendor Advisory
-
http://www.securityfocus.com/bid/46729
libcgroup Heap Based Buffer Overflow Vulnerability
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html
[SECURITY] Fedora 14 Update: libcgroup-0.36.2-6.fc14
-
http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download
Download Control Group Configuration from SourceForge.netPatch
-
http://www.debian.org/security/2011/dsa-2193
Debian -- Security Information -- DSA-2193-1 libcgroup
-
http://www.securitytracker.com/id?1025158
libcgroup Controller List Heap Overflow Lets Local Users Gain Elevated Privileges - SecurityTracker
-
http://www.redhat.com/support/errata/RHSA-2011-0320.html
Support
-
http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html
openSUSE-SU-2011:0316-1 (important): libcgroup1: Fixed heap-based buffer
-
http://libcg.git.sourceforge.net/git/gitweb.cgi?p=libcg/libcg%3Ba=commit%3Bh=5ae8aea1ecd60c439121d3329d8eaabf13d292c1
Control Group Configuration / Git tools
-
http://www.vupen.com/english/advisories/2011/0774
Webmail | OVH- OVH
Products affected by CVE-2011-1006
- cpe:2.3:a:balbir_singh:libcgroup:*:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.37:rc1:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.36.2:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.36.1:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.32.1:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.32:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.35:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.34:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.1c:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.36:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.35.1:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.31:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.33:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.32.2:*:*:*:*:*:*:*
- cpe:2.3:a:balbir_singh:libcgroup:0.1b:*:*:*:*:*:*:*