4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
kernel is vulnerable to spoofing attacks. A flaw in the CIFS handling of the mount option sec=
that didn’t enable integrity checking and didn’t produce any error message.
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=246595
kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.23-rc1
lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html
lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html
secunia.com/advisories/26366
secunia.com/advisories/26647
secunia.com/advisories/26760
secunia.com/advisories/27436
secunia.com/advisories/27747
secunia.com/advisories/27912
secunia.com/advisories/28806
support.avaya.com/elmodocs2/security/ASA-2007-474.htm
www.debian.org/security/2007/dsa-1363
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2007-0705.html
www.redhat.com/support/errata/RHSA-2007-0939.html
www.securityfocus.com/bid/25244
www.ubuntu.com/usn/usn-510-1
access.redhat.com/errata/RHSA-2007:0705
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9670