7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
18.9%
The DNS resolution functionality in the CIFS implementation in the Linux
kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled, relies on a
user’s keyring for the dns_resolver upcall in the cifs.upcall userspace
helper, which allows local users to spoof the results of DNS queries and
perform arbitrary CIFS mounts via vectors involving an add_key call,
related to a “cache stuffing” issue and MS-DFS referrals.
Author | Note |
---|---|
sbeattie | according to oss-security discussion, git commit 6103335de8afa5d780dcd512abe85c696af7b040 introduced the problem, so 2.6.25-rc1 onwards. |
smb | Jaunty may be affected, but the problem is that there is no infra- structure for thread credentials, so even if it is possible to back- port the whole thing it would be completely different and prone to be incorrect. That together with the fact that Jaunty is EOL more or less I don’t think we should put in much effort there. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 9.10 | noarch | linux | < 2.6.31-22.67 | UNKNOWN |
ubuntu | 10.04 | noarch | linux | < 2.6.32-25.43 | UNKNOWN |
ubuntu | 9.10 | noarch | linux-ec2 | < 2.6.31-307.21 | UNKNOWN |
ubuntu | 10.04 | noarch | linux-ec2 | < 2.6.32-309.18 | UNKNOWN |
ubuntu | 9.10 | noarch | linux-fsl-imx51 | < 2.6.31-112.30 | UNKNOWN |
ubuntu | 10.04 | noarch | linux-fsl-imx51 | < 2.6.31-608.22 | UNKNOWN |
ubuntu | 10.04 | noarch | linux-lts-backport-maverick | < 2.6.35-25.44~lucid1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2010-2524
nvd.nist.gov/vuln/detail/CVE-2010-2524
security-tracker.debian.org/tracker/CVE-2010-2524
ubuntu.com/security/notices/USN-1000-1
ubuntu.com/security/notices/USN-1074-1
ubuntu.com/security/notices/USN-1074-2
ubuntu.com/security/notices/USN-1083-1
www.cve.org/CVERecord?id=CVE-2010-2524
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
18.9%