3 results (0.011 seconds)

CVSS: 7.8EPSS: 0%CPEs: 18EXPL: 0

The init script in the Gentoo app-admin/logstash-bin package before 5.5.3 and 5.6.x before 5.6.1 has "chown -R" calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to a $LS_USER account for creation of a hard link. El script init en el paquete app-admin/logstash-bin de Gentoo en versiones anteriores a la 5.5.3 y las versiones 5.6.x anteriores a la 5.6.1 tiene llamadas "chown -R" para árboles de directorio escribibles por los usuarios, lo que permite que los usuarios locales obtengan privilegios aprovechando el acceso a una cuenta $LS_USER para crear un vínculo físico. • https://bugs.gentoo.org/628558 https://github.com/gentoo/gentoo/pull/5665 https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=18f97c851c209f291b31ae7a902719f1c17c79fa https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=bbd6cb398c1740c68e9b1b78340c887c58c1fbda • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 5.9EPSS: 0%CPEs: 9EXPL: 0

Logstash 1.4.x before 1.4.5 and 1.5.x before 1.5.4 with Lumberjack output or the Logstash forwarder does not validate SSL/TLS certificates from the Logstash server, which might allow attackers to obtain sensitive information via a man-in-the-middle attack. Logstash en versiones 1.4.x anteriores a la 1.4.5 y en versiones 1.5.x anteriores a la 1.5.4 con salida Lumberjack o el redireccionador Logstash no valida certificados SSL/TLS desde el servidor Logstash, lo que podría permitir que atacantes obtuviesen información confidencial mediante un ataque man-in-the-middle. • http://packetstormsecurity.com/files/133269/Logstash-1.5.3-Man-In-The-Middle.html http://www.securityfocus.com/archive/1/536294/100/0/threaded http://www.securityfocus.com/archive/1/536858/100/0/threaded http://www.securityfocus.com/bid/76455 https://www.elastic.co/blog/logstash-1-5-4-and-1-4-5-released • CWE-295: Improper Certificate Validation •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

Logstash 1.5.x before 1.5.3 and 1.4.x before 1.4.4 allows remote attackers to read communications between Logstash Forwarder agent and Logstash server. Logstash 1.5.x versiones anteriores a 1.5.3 y 1.4.x anteriores a 1.4.4 permite a atacantes remotos leer las comunicaciones entre el agente Logstash Forwarder y el servidor Logstash. • http://packetstormsecurity.com/files/132800/Logstash-1.5.2-SSL-TLS-FREAK.html http://www.securityfocus.com/archive/1/536050/100/0/threaded http://www.securityfocus.com/archive/1/536859/100/0/threaded http://www.securityfocus.com/bid/76015 https://www.elastic.co/community/security • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •