// For flags

CVE-2011-2489

Debian Security Advisory 2281-1

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple off-by-one errors in opiesu.c in opiesu in OPIE 2.4.1-test1 and earlier might allow local users to gain privileges via a crafted command line.

MĂșltiples errores "off-by-one" (desbordamiento por un elemento) en opiesu.c de opiesu en OPIE 2.4.1-test1 y versiones anteriores permiten a usuarios locales escalar privilegios a travĂ©s de un comando modificado.

Sebastian Krahmer discovered that opie, a system that makes it simple to use One-Time passwords in applications, is prone to a privilege escalation (CVE-2011-2490) and an off-by-one error, which can lead to the execution of arbitrary code (CVE-2011-2489). Adam Zabrocki and Maksymilian Arciemowicz also discovered another off-by-one error (CVE-2010-1938), which only affects the lenny version as the fix was already included for squeeze.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-06-15 CVE Reserved
  • 2011-07-21 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-08-06 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-189: Numeric Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
<= 2.4.1
Search vendor "Nrl" for product "Opie" and version " <= 2.4.1"
test1
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.2
Search vendor "Nrl" for product "Opie" and version "2.2"
-
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.3
Search vendor "Nrl" for product "Opie" and version "2.3"
-
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.4
Search vendor "Nrl" for product "Opie" and version "2.4"
-
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.10
Search vendor "Nrl" for product "Opie" and version "2.10"
-
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.11
Search vendor "Nrl" for product "Opie" and version "2.11"
-
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.21
Search vendor "Nrl" for product "Opie" and version "2.21"
-
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.22
Search vendor "Nrl" for product "Opie" and version "2.22"
-
Affected
Nrl
Search vendor "Nrl"
Opie
Search vendor "Nrl" for product "Opie"
2.32
Search vendor "Nrl" for product "Opie" and version "2.32"
-
Affected