ceph-deploy CVE-2015-4053 Insecure File Permissions Vulnerability

ceph-deploy is prone to an insecure file-permissions vulnerability.

A local attacker can exploit this issue by gaining access to a world-readable file and extracting sensitive information from it. Information obtained may aid in other attacks.


 

Privacy Statement
Copyright 2010, SecurityFocus