The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
Advisories
Source ID Title
EUVD EUVD EUVD-2011-2883 The AX.25 daemon (ax25d) in ax25-tools before 0.0.8-13 does not check the return value of a setuid call. The setuid call is responsible for dropping privileges but if the call fails the daemon would continue to run with root privileges which can allow possible privilege escalation.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T23:15:31.523Z

Reserved: 2011-07-27T00:00:00

Link: CVE-2011-2910

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-11-15T17:15:12.617

Modified: 2024-11-21T01:29:15.430

Link: CVE-2011-2910

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.