Openswan 2.2.x does not properly restrict permissions for (1) /var/run/starter.pid, related to starter.c in the IPsec starter, and (2) /var/lock/subsys/ipsec, which allows local users to kill arbitrary processes by writing a PID to a file, or possibly bypass disk quotas by writing arbitrary data to a file, as demonstrated by files with 0666 permissions, a different vulnerability than CVE-2011-1784.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://lists.debian.org/debian-security/2011/05/msg00012.html | mailing list |
http://lists.debian.org/debian-security/2011/05/msg00018.html | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67822 | vdb entry |
http://lists.debian.org/debian-security/2011/05/msg00013.html | mailing list |