The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Linux kernel: file modification

Synthesis of the vulnerability 

In a special case, a local attacker can use /proc/PID/fd in order to alter the file of a user.
Vulnerable products: Linux.
Severity of this weakness: 1/4.
Creation date: 26/10/2009.
Références of this bulletin: BID-36806, VIGILANCE-VUL-9120.

Description of the vulnerability 

The /proc/PID/fd/x virtual file is used to access to a file descriptor of a process.

However, access rights to /proc/PID/fd/x are not synchronized with access rights of the original file.

For example, if access rights to a directory (where the original file is stored) are restricted, a local attacker can use /proc/PID/fd/x to continue accessing to the original file.

In a special case, a local attacker can therefore use /proc/PID/fd in order to alter the file of a user.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity note impacts software or systems such as Linux.

Our Vigil@nce team determined that the severity of this computer weakness announce is low.

The trust level is of type contradictory sources, with an origin of user shell.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this cybersecurity vulnerability.

Solutions for this threat 

Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability announce. The technology watch team tracks security threats targeting the computer system.