Boletines de Vulnerabilidades |
Aumento de privilegios en util-linux |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Aumento de privilegios |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto con cuenta |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | util-linux |
Descripción |
|
Se ha encontrado una vulnerabilidad en util-linux en los comandos mount y umount. La vulnerabilidad reside al llamar a las funciones setuid y setgid en orden incorrecto y al no comprobar los valores de retorno. Un atacante remoto podría aumentar sus privilegios mediante helpers tales como mount.nfs. |
|
Solución |
|
Actualización de software Mandriva (MDKSA-2007:198) Corporate Server 3.0 X86 corporate/3.0/i586/losetup-2.12-2.3.C30mdk.i586.rpm corporate/3.0/i586/mount-2.12-2.3.C30mdk.i586.rpm corporate/3.0/i586/util-linux-2.12-2.3.C30mdk.i586.rpm corporate/3.0/SRPMS/util-linux-2.12-2.3.C30mdk.src.rpm X86_64 corporate/3.0/x86_64/losetup-2.12-2.3.C30mdk.x86_64.rpm corporate/3.0/x86_64/mount-2.12-2.3.C30mdk.x86_64.rpm corporate/3.0/x86_64/util-linux-2.12-2.3.C30mdk.x86_64.rpm corporate/3.0/SRPMS/util-linux-2.12-2.3.C30mdk.src.rpm Multi Network Firewall 2.0 X86 mnf/2.0/i586/losetup-2.12-2.3.M20mdk.i586.rpm mnf/2.0/i586/mount-2.12-2.3.M20mdk.i586.rpm mnf/2.0/i586/util-linux-2.12-2.3.M20mdk.i586.rpm mnf/2.0/SRPMS/util-linux-2.12-2.3.M20mdk.src.rpm Mandriva Linux 2007 X86 2007.0/i586/losetup-2.12r-8.3mdv2007.0.i586.rpm 2007.0/i586/mount-2.12r-8.3mdv2007.0.i586.rpm 2007.0/i586/util-linux-2.12r-8.3mdv2007.0.i586.rpm 2007.0/SRPMS/util-linux-2.12r-8.3mdv2007.0.src.rpm X86_64 2007.0/x86_64/losetup-2.12r-8.3mdv2007.0.x86_64.rpm 2007.0/x86_64/mount-2.12r-8.3mdv2007.0.x86_64.rpm 2007.0/x86_64/util-linux-2.12r-8.3mdv2007.0.x86_64.rpm 2007.0/SRPMS/util-linux-2.12r-8.3mdv2007.0.src.rpm Corporate Server 4.0 X86 corporate/4.0/i586/losetup-2.12q-7.3.20060mlcs4.i586.rpm corporate/4.0/i586/mount-2.12q-7.3.20060mlcs4.i586.rpm corporate/4.0/i586/util-linux-2.12q-7.3.20060mlcs4.i586.rpm corporate/4.0/SRPMS/util-linux-2.12q-7.3.20060mlcs4.src.rpm X86_64 corporate/4.0/x86_64/losetup-2.12q-7.3.20060mlcs4.x86_64.rpm corporate/4.0/x86_64/mount-2.12q-7.3.20060mlcs4.x86_64.rpm corporate/4.0/x86_64/util-linux-2.12q-7.3.20060mlcs4.x86_64.rpm corporate/4.0/SRPMS/util-linux-2.12q-7.3.20060mlcs4.src.rpm Mandriva Linux 2007.1 X86 2007.1/i586/losetup-2.12r-12.2mdv2007.1.i586.rpm 2007.1/i586/mount-2.12r-12.2mdv2007.1.i586.rpm 2007.1/i586/util-linux-2.12r-12.2mdv2007.1.i586.rpm 2007.1/SRPMS/util-linux-2.12r-12.2mdv2007.1.src.rpm X86_64 2007.1/x86_64/losetup-2.12r-12.2mdv2007.1.x86_64.rpm 2007.1/x86_64/mount-2.12r-12.2mdv2007.1.x86_64.rpm 2007.1/x86_64/util-linux-2.12r-12.2mdv2007.1.x86_64.rpm 2007.1/SRPMS/util-linux-2.12r-12.2mdv2007.1.src.rpm Mandriva Linux 2008.0 X86 2008.0/i586/util-linux-ng-2.13-3.1mdv2008.0.i586.rpm 2008.0/SRPMS/util-linux-ng-2.13-3.1mdv2008.0.src.rpm X86_64 2008.0/x86_64/util-linux-ng-2.13-3.1mdv2008.0.x86_64.rpm 2008.0/SRPMS/util-linux-ng-2.13-3.1mdv2008.0.src.rpm Red Hat (RHSA-2007:0969-5) Red Hat Desktop (v. 3) Red Hat Desktop (v. 4) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux AS (v. 4) Red Hat Enterprise Linux Desktop (v. 5 client) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux ES (v. 4) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux WS (v. 4) https://rhn.redhat.com/ Debian (DSA 1449-1) Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2.dsc http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p.orig.tar.gz http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2.diff.gz alpha http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_alpha.deb amd64 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_amd64.deb arm http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_arm.deb hppa http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_hppa.deb i386 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_i386.deb ia64 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_ia64.deb m68k http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_m68k.deb mips http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_mips.deb mipsel http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_mipsel.deb powerpc http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_powerpc.deb s390 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_s390.deb sparc http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12p-4sarge2_sparc.deb Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1.diff.gz http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1.dsc alpha http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_alpha.deb http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_alpha.udeb amd64 http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_amd64.udeb http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_amd64.deb arm http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_arm.udeb http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_arm.deb hppa http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_hppa.udeb http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_hppa.deb i386 http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_i386.udeb http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_i386.deb ia64 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_ia64.deb http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_ia64.udeb mips http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_mips.deb http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_mips.udeb mipsel http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_mipsel.deb http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_mipsel.udeb powerpc http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_powerpc.deb http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_powerpc.udeb s390 http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_s390.deb http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_s390.udeb sparc http://security.debian.org/pool/updates/main/l/loop-aes-utils/mount-aes-udeb_2.12r-15+etch1_sparc.udeb http://security.debian.org/pool/updates/main/l/loop-aes-utils/loop-aes-utils_2.12r-15+etch1_sparc.deb Debian (DSA 1450-1) Debian Linux 3.1 Source http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2.dsc http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2.diff.gz http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/u/util-linux/util-linux-locales_2.12p-4sarge2_all.deb alpha http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_alpha.udeb arm http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_arm.udeb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_arm.deb hppa http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_hppa.udeb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_hppa.deb i386 http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_i386.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_i386.deb ia64 http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_ia64.udeb m68k http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_m68k.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_m68k.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_m68k.deb mips http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_mips.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_mips.deb mipsel http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_mipsel.udeb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_mipsel.deb powerpc http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_powerpc.udeb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_powerpc.deb s390 http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_s390.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_s390.deb sparc http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12p-4sarge2_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12p-4sarge2_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12p-4sarge2_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12p-4sarge2_sparc.udeb Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1.dsc http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1.diff.gz Architecture independent http://security.debian.org/pool/updates/main/u/util-linux/util-linux-locales_2.12r-19etch1_all.deb alpha http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_alpha.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_alpha.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_alpha.udeb amd64 http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_amd64.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_amd64.deb http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_amd64.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_amd64.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_amd64.udeb arm http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_arm.udeb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_arm.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_arm.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_arm.deb hppa http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_hppa.udeb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_hppa.udeb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_hppa.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_hppa.deb i386 http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_i386.udeb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_i386.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_i386.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_i386.deb ia64 http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_ia64.deb http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_ia64.udeb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_ia64.udeb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_ia64.deb mips http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_mips.udeb http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_mips.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_mips.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_mips.deb mipsel http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_mipsel.udeb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_mipsel.udeb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_mipsel.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_mipsel.deb powerpc http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_powerpc.udeb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_powerpc.deb http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_powerpc.udeb s390 http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_s390.udeb http://security.debian.org/pool/updates/main/u/util-linux/cfdisk-udeb_2.12r-19etch1_s390.udeb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_s390.deb http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_s390.deb sparc http://security.debian.org/pool/updates/main/u/util-linux/mount_2.12r-19etch1_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/fdisk-udeb_2.12r-19etch1_sparc.udeb http://security.debian.org/pool/updates/main/u/util-linux/util-linux_2.12r-19etch1_sparc.deb http://security.debian.org/pool/updates/main/u/util-linux/bsdutils_2.12r-19etch1_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CVE-2007-5191 |
BID | 25973 |
Recursos adicionales |
|
Mandriva Security Advisory (MDKSA-2007:198) http://www.mandriva.com/security/advisories?name=MDKSA-2007:198 Red Hat Security Advisory (RHSA-2007:0969-5) https://rhn.redhat.com/errata/RHSA-2007-0969.html Debian Security Advisory (DSA 1449-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00005.html Debian Security Advisory (DSA 1450-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2008/msg00006.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2007-10-22 |
1.1 | Aviso emitido por Red Hat (RHSA-2007:0969-5) | 2007-11-19 |
1.2 | Aviso emitido por Debian (DSA 1449-1), aviso emitido por Debian (DSA 1450-1) | 2008-01-07 |