Munin before 2.0.6 stores plugin state files that run as root in the same group-writable directory as non-root plugins, which allows local users to execute arbitrary code by replacing a state file, as demonstrated using the smart_ plugin.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088260.html | vendor advisory |
http://www.ubuntu.com/usn/USN-1622-1 | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088239.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/08/21/1 | mailing list |
http://www.munin-monitoring.org/ticket/1234 | exploit vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/086375.html | vendor advisory |
http://www.securityfocus.com/bid/55698 | vdb entry |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684075 | exploit |