exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2008-009

Mandriva Linux Security Advisory 2008-009
Posted Jan 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The default behaviour of autofs 5 for the hosts map did not specify the nosuid and nodev mount options. This could allow a local user with control of a remote NFS server to create a setuid root executable on the exported filesystem of the remote NFS server. If this filesystem was mounted with the default hosts map, it would allow the user to obtain root privileges. Likewise, the same scenario would be available for local users able to create device files on the exported filesystem which could allow the user to gain access to important system devices. Because the default behaviour of autofs was to mount -hosts map entries with the dev and suid options enabled by default, autofs has been altered to always use nodev and nosuid by default. In order to have the old behaviour, the configuration must now explicitly set the dev and/or suid options.

tags | advisory, remote, local, root
systems | linux, mandriva
advisories | CVE-2007-5964, CVE-2007-6285
SHA-256 | 6c43fb42ec354057d979487502778cd57515d81148a18b6002b61ebc91bc2e35

Mandriva Linux Security Advisory 2008-009

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2008:009
http://www.mandriva.com/security/
_______________________________________________________________________

Package : autofs
Date : January 11, 2008
Affected: 2007.0, 2007.1, 2008.0
_______________________________________________________________________

Problem Description:

The default behaviour of autofs 5 for the hosts map did not specify the
nosuid and nodev mount options. This could allow a local user with
control of a remote NFS server to create a setuid root executable on
the exported filesystem of the remote NFS server. If this filesystem
was mounted with the default hosts map, it would allow the user to
obtain root privileges (CVE-2007-5964). Likewise, the same scenario
would be available for local users able to create device files on
the exported filesystem which could allow the user to gain access to
important system devices (CVE-2007-6285).

Because the default behaviour of autofs was to mount -hosts map
entries with the dev and suid options enabled by default, autofs has
been altered to always use nodev and nosuid by default. In order
to have the old behaviour, the configuration must now explicitly set
the dev and/or suid options.

This change only affects the -hosts map which corresponds to the /net
entry in the default configuration.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5964
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6285
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
3390bf55832dffd626f5f8ce0e8ad8ea 2007.0/i586/autofs-5.0.1-0.rc3.1.2mdv2007.0.i586.rpm
11c33cfb8d77ff2639c70e32ac04ed73 2007.0/SRPMS/autofs-5.0.1-0.rc3.1.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
3667ed52652d4d622e3f6d5308ef8699 2007.0/x86_64/autofs-5.0.1-0.rc3.1.2mdv2007.0.x86_64.rpm
11c33cfb8d77ff2639c70e32ac04ed73 2007.0/SRPMS/autofs-5.0.1-0.rc3.1.2mdv2007.0.src.rpm

Mandriva Linux 2007.1:
5e14c8e8dd49af8edb3a341c0cbcad9d 2007.1/i586/autofs-5.0.2-8.3mdv2007.1.i586.rpm
a2eb4b39b2b08884996ec57f903c05b4 2007.1/SRPMS/autofs-5.0.2-8.3mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
3970bd93953401bbbe1c38218f0decb9 2007.1/x86_64/autofs-5.0.2-8.3mdv2007.1.x86_64.rpm
a2eb4b39b2b08884996ec57f903c05b4 2007.1/SRPMS/autofs-5.0.2-8.3mdv2007.1.src.rpm

Mandriva Linux 2008.0:
ab967ba2caa70946b72296ee7aae057d 2008.0/i586/autofs-5.0.2-8.3mdv2008.0.i586.rpm
30079164e7eaacaeb3f61dc3afbb9749 2008.0/SRPMS/autofs-5.0.2-8.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
15001d59d62d3c0909fce6ce2dbcb9bd 2008.0/x86_64/autofs-5.0.2-8.3mdv2008.0.x86_64.rpm
30079164e7eaacaeb3f61dc3afbb9749 2008.0/SRPMS/autofs-5.0.2-8.3mdv2008.0.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (GNU/Linux)

iD8DBQFHh8pWmqjQ0CJFipgRAnIKAJ9b+Gn2KsVTOTu2qW1vBN5rH2cqQwCg7qHW
clyU0JzCNNl6+5y2ntsp4hI=
=QbIM
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close