6.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N
4.9 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
37.6%
A flaw was found in cifs-utils in versions before 6.13. A user when
mounting a krb5 CIFS file system from within a container can use Kerberos
credentials of the host. The highest threat from this vulnerability is to
data confidentiality and integrity.
Author | Note |
---|---|
mdeslaur | per Red Hat bug, 6.13 was missing two important fixes, and 6.14 is required. per Debian, causes a regression, see: https://bugs.debian.org/989080 https://www.spinics.net/lists/linux-cifs/msg21976.html |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | cifs-utils | < 2:6.8-1ubuntu1.2 | UNKNOWN |
ubuntu | 20.04 | noarch | cifs-utils | < 2:6.9-1ubuntu0.2 | UNKNOWN |
ubuntu | 14.04 | noarch | cifs-utils | < any | UNKNOWN |
ubuntu | 16.04 | noarch | cifs-utils | < any | UNKNOWN |
6.1 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N
4.9 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N
0.001 Low
EPSS
Percentile
37.6%