Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
References
Configurations
History
21 Nov 2024, 01:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2011/dsa-2323 - | |
References | () http://www.litech.org/radvd/CHANGES - | |
References | () http://www.openwall.com/lists/oss-security/2011/10/06/3 - | |
References | () http://www.ubuntu.com/usn/USN-1257-1 - Vendor Advisory | |
References | () https://github.com/reubenhwk/radvd/commit/92e22ca23e52066da2258df8c76a2dca8a428bcc - |
07 Nov 2023, 02:08
Type | Values Removed | Values Added |
---|---|---|
Summary | Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files. |
Information
Published : 2014-04-27 21:55
Updated : 2024-11-21 01:30
NVD link : CVE-2011-3602
Mitre link : CVE-2011-3602
CVE.ORG link : CVE-2011-3602
JSON object : View
Products Affected
litech
- router_advertisement_daemon
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')