Vulnerability Name: | CVE-2011-1749 (CCN-95696) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2011-04-19 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2011-04-19 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2014-03-10 | ||||||||||||||||||||||||||||||||||||||||
Summary: | The nfs_addmntent function in support/nfs/nfs_mntent.c in the mount.nsf tool in nfs-utils before 1.2.4 attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to corrupt this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 3.3 Low (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P) 2.5 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
2.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:C)
1.4 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2011-1749 Source: REDHAT Type: UNKNOWN RHSA-2011:1534 Source: REDHAT Type: Patch RHSA-2012:0310 Source: CONFIRM Type: Patch http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download Source: MLIST Type: UNKNOWN [oss-security] 20140425 Re: CVE request: CVE-2011-1089-like flaw in mount.nfs Source: CCN Type: Red Hat Bugzilla Bug 697975 (CVE-2011-1749) CVE-2011-1749 nfs-utils: mount.nfs fails to anticipate RLIMIT_FSIZE Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=697975 Source: XF Type: UNKNOWN nfsutils-cve20111749-code-exec(95696) Source: CCN Type: WhiteSource Vulnerability Database CVE-2011-1749 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration RedHat 5: Configuration RedHat 6: Configuration RedHat 7: Configuration RedHat 8: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |