CVE-2011-1006 (GCVE-0-2011-1006)

Vulnerability from cvelistv5 – Published: 2011-03-22 17:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application. NOTE: it is not clear whether this issue crosses privilege boundaries.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/43758 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=678107 x_refsource_CONFIRM
http://secunia.com/advisories/44093 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/46729 vdb-entryx_refsource_BID
http://sourceforge.net/projects/libcg/files/libcg… x_refsource_CONFIRM
http://libcg.git.sourceforge.net/git/gitweb.cgi?p… x_refsource_CONFIRM
http://secunia.com/advisories/43891 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2011/dsa-2193 vendor-advisoryx_refsource_DEBIAN
http://lists.opensuse.org/opensuse-updates/2011-0… vendor-advisoryx_refsource_SUSE
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2011/0679 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2011/0774 vdb-entryx_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2011-03… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/43611 third-party-advisoryx_refsource_SECUNIA
http://lists.fedoraproject.org/pipermail/package-… vendor-advisoryx_refsource_FEDORA
http://www.securitytracker.com/id?1025158 vdb-entryx_refsource_SECTRACK
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.009Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "43758",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43758"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678107"
          },
          {
            "name": "44093",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44093"
          },
          {
            "name": "46729",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46729"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://libcg.git.sourceforge.net/git/gitweb.cgi?p=libcg/libcg%3Ba=commit%3Bh=5ae8aea1ecd60c439121d3329d8eaabf13d292c1"
          },
          {
            "name": "43891",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43891"
          },
          {
            "name": "DSA-2193",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2193"
          },
          {
            "name": "openSUSE-SU-2011:0316",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html"
          },
          {
            "name": "FEDORA-2011-2631",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html"
          },
          {
            "name": "ADV-2011-0679",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0679"
          },
          {
            "name": "ADV-2011-0774",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0774"
          },
          {
            "name": "RHSA-2011:0320",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0320.html"
          },
          {
            "name": "43611",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43611"
          },
          {
            "name": "FEDORA-2011-2638",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html"
          },
          {
            "name": "1025158",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025158"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application.  NOTE: it is not clear whether this issue crosses privilege boundaries."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-04-09T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "43758",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43758"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678107"
        },
        {
          "name": "44093",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44093"
        },
        {
          "name": "46729",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46729"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://libcg.git.sourceforge.net/git/gitweb.cgi?p=libcg/libcg%3Ba=commit%3Bh=5ae8aea1ecd60c439121d3329d8eaabf13d292c1"
        },
        {
          "name": "43891",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43891"
        },
        {
          "name": "DSA-2193",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2193"
        },
        {
          "name": "openSUSE-SU-2011:0316",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html"
        },
        {
          "name": "FEDORA-2011-2631",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html"
        },
        {
          "name": "ADV-2011-0679",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0679"
        },
        {
          "name": "ADV-2011-0774",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0774"
        },
        {
          "name": "RHSA-2011:0320",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0320.html"
        },
        {
          "name": "43611",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43611"
        },
        {
          "name": "FEDORA-2011-2638",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html"
        },
        {
          "name": "1025158",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025158"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1006",
    "datePublished": "2011-03-22T17:00:00",
    "dateReserved": "2011-02-14T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.009Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-1006\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-03-22T17:55:01.300\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the parse_cgroup_spec function in tools/tools-common.c in the Control Group Configuration Library (aka libcgroup or libcg) before 0.37.1 allows local users to gain privileges via a crafted controller list on the command line of an application.  NOTE: it is not clear whether this issue crosses privilege boundaries.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de buffer de memoria din\u00e1mica en la funci\u00f3n parse_cgroup_spec de tools/tools-common.c de la librer\u00eda \\\"Control Group Configuration\\\" (libcgroup o libcg) en versiones anteriores a la 0.37.1.  Permite a usuarios locales escalar privilegios a trav\u00e9s de una lista de controladores modificada en la l\u00ednea de comandos de un aplicaci\u00f3n. NOTA: no est\u00e1 claro si este problema traspasa las restricciones de privilegios.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.37\",\"matchCriteriaId\":\"DF0BCCAA-81E9-437F-BA72-BA4CD06A486C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F309E6-1832-4E2E-9E08-AC86FDBB5F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DDACB92-6E32-49BB-8C1C-2897CC848208\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C80D9D-E561-4703-96AD-A94EAC8E164B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8633EB57-9EE8-4653-B8F6-A25465A9EA17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F48A0C-3B96-43B9-9B69-54823BA06750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"653BEE43-D5D5-4CF9-82A1-F6FCD9FF4888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.32.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE89E298-CAEF-422C-9CCD-681A199BC57F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.32.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C27CEFA-E730-4B14-ADEB-88D176C009ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845A2CE5-0787-4A27-B49B-E254F19BB3A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E87B161B-5DF9-42F0-82FE-D2E277B894C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3C8A145-D946-4F34-A40D-CC97B92D43B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.35.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8910F268-5B95-4459-9411-222DCD85BFF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0ED72E4-64CD-4A8C-8911-7DC362D40A69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.36.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE35D91B-E874-4E60-ACB4-42102393264E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.36.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F28E1E9-3AB9-484E-A4AC-338893DE9E4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:balbir_singh:libcgroup:0.37:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"208A5A77-C092-4F84-B8C7-476A2321AFBA\"}]}]}],\"references\":[{\"url\":\"http://libcg.git.sourceforge.net/git/gitweb.cgi?p=libcg/libcg%3Ba=commit%3Bh=5ae8aea1ecd60c439121d3329d8eaabf13d292c1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/43611\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43758\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43891\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/44093\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2193\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0320.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/46729\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1025158\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0679\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0774\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=678107\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://libcg.git.sourceforge.net/git/gitweb.cgi?p=libcg/libcg%3Ba=commit%3Bh=5ae8aea1ecd60c439121d3329d8eaabf13d292c1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056683.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056734.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2011-04/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43611\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43891\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/44093\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/projects/libcg/files/libcgroup/v0.37.1/libcgroup-0.37.1.tar.bz2/download\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2011/dsa-2193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0320.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/46729\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0679\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=678107\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…