Vulnerability Name: | CVE-2009-3286 (CCN-53562) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2009-09-09 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2009-09-09 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-09-19 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | NFSv4 in the Linux kernel 2.6.18, and possibly other versions, does not properly clean up an inode when an O_EXCL create fails, which causes files to be created with insecure settings such as setuid bits, and possibly allows local users to gain privileges, related to the execution of the do_open_permission function even when a create fails. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P) 3.5 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
3.3 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
3.5 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:TF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2009-3286 Source: CCN Type: Linux Kernel GIT Repository [PATCH] nfsd4: fix open-create permissions Source: CONFIRM Type: Patch http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=81ac95c5 Source: SUSE Type: UNKNOWN SUSE-SA:2010:012 Source: CCN Type: VMware Security Announcements VMSA-2010-0004 ESX Service Console and vMA third party updates Source: MLIST Type: UNKNOWN [security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates Source: CCN Type: RHSA-2009-1548 Important: kernel security and bug fix update Source: SECUNIA Type: Vendor Advisory 37105 Source: CCN Type: SA38794 VMware vMA Update for Multiple Packages Source: SECUNIA Type: Vendor Advisory 38794 Source: CCN Type: SA38834 VMware ESX Server 4 Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 38834 Source: DEBIAN Type: DSA-1915 linux-2.6 -- privilege escalation/denial of service/sensitive memory leak Source: DEBIAN Type: DSA-1928 linux-2.6.24 -- privilege escalation/denial of service/sensitive memory leak Source: DEBIAN Type: DSA-1929 linux-2.6 -- privilege escalation/denial of service/sensitive memory leak Source: CCN Type: oss-security Mailing List, Mon, 21 Sep 2009 13:45:31 +0800 CVE request: kernel: issue with O_EXCL creates on NFSv4 Source: MLIST Type: UNKNOWN [oss-security] 20090921 CVE request: kernel: issue with O_EXCL creates on NFSv4 Source: CCN Type: OSVDB ID: 58323 Linux Kernel NFSv4 o_EXCL inode Creation Failure Local Privilege Escalation Source: CCN Type: BID-36472 Linux kernel 'O_EXCL' NFSv4 Privilege Escalation Vulnerability Source: CCN Type: USN-852-1 Linux kernel vulnerabilities Source: UBUNTU Type: UNKNOWN USN-852-1 Source: VUPEN Type: Vendor Advisory ADV-2010-0528 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=524520 Source: XF Type: UNKNOWN linux-kernel-nfsv4-priv-escalation(53562) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:7527 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:9757 Source: REDHAT Type: UNKNOWN RHSA-2009:1548 Source: SUSE Type: SUSE-SA:2009:060 Linux kernel security update Source: SUSE Type: SUSE-SA:2010:012 Linux kernel security update | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |