CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
10.1%
The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
Vendor | Product | Version | CPE |
---|---|---|---|
gnu | glibc | * | cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* |
gnu | glibc | 2.0 | cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:* |
gnu | glibc | 2.0.1 | cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:* |
gnu | glibc | 2.0.2 | cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:* |
gnu | glibc | 2.0.3 | cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:* |
gnu | glibc | 2.0.4 | cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:* |
gnu | glibc | 2.0.5 | cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:* |
gnu | glibc | 2.0.6 | cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:* |
gnu | glibc | 2.1 | cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:* |
gnu | glibc | 2.1.1 | cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:* |
frugalware.org/security/662
packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
seclists.org/fulldisclosure/2019/Jun/18
secunia.com/advisories/39900
secunia.com/advisories/43830
secunia.com/advisories/46397
security.gentoo.org/glsa/glsa-201011-01.xml
securitytracker.com/id?1024043
sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540
www.debian.org/security/2010/dsa-2058
www.mandriva.com/security/advisories?name=MDVSA-2010:111
www.mandriva.com/security/advisories?name=MDVSA-2010:112
www.redhat.com/support/errata/RHSA-2011-0412.html
www.securityfocus.com/archive/1/520102/100/0/threaded
www.ubuntu.com/usn/USN-944-1
www.vmware.com/security/advisories/VMSA-2011-0012.html
www.vupen.com/english/advisories/2010/1246
www.vupen.com/english/advisories/2011/0863
bugzilla.redhat.com/show_bug.cgi?id=559579
exchange.xforce.ibmcloud.com/vulnerabilities/59240
lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
seclists.org/bugtraq/2019/Jun/14