Lucene search

K
ubuntuUbuntuUSN-184-1
HistorySep 19, 2005 - 12:00 a.m.

umount vulnerability

2005-09-1900:00:00
ubuntu.com
63

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.4%

Releases

  • Ubuntu 5.04
  • Ubuntu 4.10

Details

David Watson discovered that “umount -r” removed some restrictive
mount options like the “nosuid” flag. If /etc/fstab contains
user-mountable removable devices which specify the “nosuid” flag
(which is common practice for such devices), a local attacker could
exploit this to execute arbitrary programs with root privileges by
calling “umount -r” on a removable device.

This does not affect the default Ubuntu configuration. Since Ubuntu
mounts removable devices automatically, there is normally no need to
configure them manually in /etc/fstab.

OSVersionArchitecturePackageVersionFilename
Ubuntu5.04noarchmount< *UNKNOWN
Ubuntu4.10noarchmount< *UNKNOWN

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

5.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.4%