VYPR

Acpid

by Tedfelix

CVEs (4)

  • CVE-2011-1159Oct 5, 2011
    risk 0.03cvss epss 0.00

    acpid.c in acpid before 2.0.9 does not properly handle a situation in which a process has connected to acpid.socket but is not reading any data, which allows local users to cause a denial of service (daemon hang) via a crafted application that performs a connect system call but no read system calls.

  • CVE-2009-0798Apr 24, 2009
    risk 0.01cvss epss 0.09

    ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.

  • CVE-2009-4235Dec 8, 2009
    risk 0.00cvss epss 0.00

    acpid 1.0.4 sets an unrestrictive umask, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file or cause a denial of service by overwriting this file, a different vulnerability than CVE-2009-4033.

  • CVE-2009-4033Dec 8, 2009
    risk 0.00cvss epss 0.00

    A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, which might allow local users to leverage weak permissions on /var/log/acpid, and obtain sensitive information by reading this file, cause a denial of service by overwriting this file, or gain privileges by executing this file.