Permissions, Privileges, and Access Controls in Keepalived - CVE-2018-19046
Published: November 10, 2018
Keepalived
Keepalived
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to software does not check for existing plain files when writing data to a temporary file upon a call to PrintData or PrintStats. A local user can create a file "/tmp/keepalived.data" or "/tmp/keepalived.stats" with read access to it for the attacker and write access for keepalived process, it is possible to gain access to sensitive information, written into these files by the application.