Vulnerability Details : CVE-2011-2147
Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrary processes by writing a PID to a file, or possibly bypass disk quotas by writing arbitrary data to a file, as demonstrated by files with 0666 permissions, a different vulnerability than CVE-2011-1784.
Exploit prediction scoring system (EPSS) score for CVE-2011-2147
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-2147
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:P |
3.9
|
4.9
|
NIST |
CWE ids for CVE-2011-2147
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2147
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/67822
Openswan starter.pid denial of service CVE-2011-2147 Vulnerability Report
-
http://lists.debian.org/debian-security/2011/05/msg00012.html
World writable pid and lock files.
-
http://lists.debian.org/debian-security/2011/05/msg00013.html
Re: World writable pid and lock files.
-
http://lists.debian.org/debian-security/2011/05/msg00018.html
Re: World writable pid and lock files.
Products affected by CVE-2011-2147
- cpe:2.3:a:openswan:openswan:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:openswan:openswan:2.2.1:*:*:*:*:*:*:*