CVE-2009-0115
Summary
| CVE | CVE-2009-0115 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2009-03-30 16:30:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: CWE-732 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 7.2 | AV:L/AC:L/Au:N/C:C/I:C/A:C |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Avaya | Intuity Audix Lx | 2.0 | - | All | All |
| Application | Avaya | Intuity Audix Lx | 2.0 | sp1 | All | All |
| Application | Avaya | Intuity Audix Lx | 2.0 | sp2 | All | All |
| Application | Avaya | Message Networking | 3.1 | All | All | All |
| Application | Avaya | Messaging Storage Server | 3.0 | All | All | All |
| Application | Avaya | Messaging Storage Server | 4.0 | All | All | All |
| Application | Avaya | Messaging Storage Server | 5.0 | All | All | All |
| Application | Christophe.varoqui | Multipath-tools | 0.4.8 | All | All | All |
| Operating System | Debian | Debian Linux | 4.0 | All | All | All |
| Operating System | Debian | Debian Linux | 5.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 10 | All | All | All |
| Operating System | Fedoraproject | Fedora | 9 | All | All | All |
| Application | Juniper | Ctpview | All | All | All | All |
| Application | Juniper | Ctpview | 7.1 | - | All | All |
| Operating System | Novell | Open Enterprise Server | - | All | All | All |
| Operating System | Opensuse | Opensuse | All | All | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 9 | All | All | All |
| Operating System | Suse | Linux Enterprise Server | 10 | - | All | All |
| Operating System | Suse | Linux Enterprise Server | 9 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Fedora update for device-mapper-multipath - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link, Vendor Advisory |
| Debian -- Security Information -- DSA-1767-1 multipath-tools | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Third Party Advisory |
| SUSE Update for Multiple Packages - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link, Vendor Advisory |
| VMware vMA Update for Multiple Packages - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link, Vendor Advisory |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:007 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List |
| Resource is no longer available! | af854a3a-2127-422b-91ae-364da2661108 | download.opensuse.org | Broken Link, Exploit |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | Broken Link |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Permissions Required |
| [SECURITY] Fedora 9 Update: device-mapper-multipath-0.4.7-17.fc9 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Mailing List |
| SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link, Vendor Advisory |
| [Security-announce] VMSA-2010-0004 ESX Service Console and vMA third party updates | af854a3a-2127-422b-91ae-364da2661108 | lists.vmware.com | Broken Link |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:008 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | Mailing List |
| CVE-2009-0115 | af854a3a-2127-422b-91ae-364da2661108 | launchpad.net | Third Party Advisory |
| Juniper Networks - 2015-10 Security Bulletin: CTPView: Multiple Vulnerabilities in CTPView | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Third Party Advisory |
| Debian update for multipath-tools - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link, Vendor Advisory |
| ASA-2009-128 (RHSA-2009-0411) | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | Third Party Advisory |
| Avaya Products device-mapper-multipath Insecure Socket - Secunia Advisories - Vulnerability Information - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link, Vendor Advisory |
| 2015-07 Security Bulletin: CTPView: Multiple vulnerabilities in CTPView - Juniper Networks | af854a3a-2127-422b-91ae-364da2661108 | kb.juniper.net | Third Party Advisory |
| [SECURITY] Fedora 10 Update: device-mapper-multipath-0.4.8-9.fc10 | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | Mailing List |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.