what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-061

Mandriva Linux Security Advisory 2010-061
Posted Mar 11, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-061 - sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name. The (1) ncpmount, (2) ncpumount, and (3) ncplogin programs in ncpfs 2.2.6 do not properly create lock files, which allows local users to cause a denial of service (application failure) via unspecified vectors that trigger the creation of a /etc/mtab~ file that persists after the program exits. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, arbitrary, local
systems | linux, mandriva
advisories | CVE-2010-0790, CVE-2010-0791
SHA-256 | 83a7c75f3efeeada265c070ec394bf9bf7567b6d73f909255f2c65e4899eb5ae

Mandriva Linux Security Advisory 2010-061

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:061
http://www.mandriva.com/security/
_______________________________________________________________________

Package : ncpfs
Date : March 11, 2010
Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
Enterprise Server 5.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Multiple vulnerabilities has been found and corrected in ncpfs:

sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed
error messages about the results of privileged file-access attempts,
which allows local users to determine the existence of arbitrary
files via the mountpoint name (CVE-2010-0790).

The (1) ncpmount, (2) ncpumount, and (3) ncplogin programs in ncpfs
2.2.6 do not properly create lock files, which allows local users
to cause a denial of service (application failure) via unspecified
vectors that trigger the creation of a /etc/mtab~ file that persists
after the program exits (CVE-2010-0791).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct these issues.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0790
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0791
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
f7a8ca8faffce840a6814724a9f4e13a 2008.0/i586/ipxutils-2.2.6-3.2mdv2008.0.i586.rpm
e26483fd14e02674e71ad594181ed79e 2008.0/i586/libncpfs2.3-2.2.6-3.2mdv2008.0.i586.rpm
9451cbbdd8249de6f9c6b2419ae747f9 2008.0/i586/libncpfs2.3-devel-2.2.6-3.2mdv2008.0.i586.rpm
84d5f1ef0b99acc91bb24554f3f77ae1 2008.0/i586/ncpfs-2.2.6-3.2mdv2008.0.i586.rpm
5fefe503c4ae846c53e1311c9b7d0fd9 2008.0/SRPMS/ncpfs-2.2.6-3.2mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
317825e9ba230cb79948eabfffb909f3 2008.0/x86_64/ipxutils-2.2.6-3.2mdv2008.0.x86_64.rpm
532c1b50f1e7e3c18a8e78c6d9a99674 2008.0/x86_64/lib64ncpfs2.3-2.2.6-3.2mdv2008.0.x86_64.rpm
05509d44fa66199cce0e607f5f748ce8 2008.0/x86_64/lib64ncpfs2.3-devel-2.2.6-3.2mdv2008.0.x86_64.rpm
755ee4bbf43040f15faeefad1d6b9bd1 2008.0/x86_64/ncpfs-2.2.6-3.2mdv2008.0.x86_64.rpm
5fefe503c4ae846c53e1311c9b7d0fd9 2008.0/SRPMS/ncpfs-2.2.6-3.2mdv2008.0.src.rpm

Mandriva Linux 2009.0:
df608af475e518bc672ec54080a71129 2009.0/i586/ipxutils-2.2.6-6.2mdv2009.0.i586.rpm
bc02fbfe14425e3a3085c9b08c99ae1c 2009.0/i586/libncpfs2.3-2.2.6-6.2mdv2009.0.i586.rpm
ee0c1b55e7d8135de3d904de32fffba4 2009.0/i586/libncpfs-devel-2.2.6-6.2mdv2009.0.i586.rpm
32a63bfd400cd0a12cf2f98dbbb2fe37 2009.0/i586/ncpfs-2.2.6-6.2mdv2009.0.i586.rpm
c80af8183956c89533f5d29018a5da3f 2009.0/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

Mandriva Linux 2009.0/X86_64:
8e2466b981f678e0300c005d2891b727 2009.0/x86_64/ipxutils-2.2.6-6.2mdv2009.0.x86_64.rpm
853cf68f0b74bb5338b4a59a2c851f3f 2009.0/x86_64/lib64ncpfs2.3-2.2.6-6.2mdv2009.0.x86_64.rpm
784e732a2fc55020081a49f08860c0b4 2009.0/x86_64/lib64ncpfs-devel-2.2.6-6.2mdv2009.0.x86_64.rpm
2c60654e5812e8b2bed23dd25b92a2e6 2009.0/x86_64/ncpfs-2.2.6-6.2mdv2009.0.x86_64.rpm
c80af8183956c89533f5d29018a5da3f 2009.0/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

Mandriva Linux 2009.1:
550f4e8f2220a1f9897e8acf9c8aa35d 2009.1/i586/ipxutils-2.2.6-7.2mdv2009.1.i586.rpm
99a731ac177a83950ec5d08a1a2f74cf 2009.1/i586/libncpfs2.3-2.2.6-7.2mdv2009.1.i586.rpm
5ffd14de2ec5a3585967ca0bdcff5268 2009.1/i586/libncpfs-devel-2.2.6-7.2mdv2009.1.i586.rpm
04232470e8c0206cf211d2bb991eb5f2 2009.1/i586/ncpfs-2.2.6-7.2mdv2009.1.i586.rpm
f9959c23aba2806c3f7fd3078b58d233 2009.1/SRPMS/ncpfs-2.2.6-7.2mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
11400b2d8f1e646ce3913d6a4f9370dc 2009.1/x86_64/ipxutils-2.2.6-7.2mdv2009.1.x86_64.rpm
90c272182b6d9fb9fdc64dec5ae2a030 2009.1/x86_64/lib64ncpfs2.3-2.2.6-7.2mdv2009.1.x86_64.rpm
66cfe5705b55b4c1aaa0907dabf77a91 2009.1/x86_64/lib64ncpfs-devel-2.2.6-7.2mdv2009.1.x86_64.rpm
0ff7654b1c841d8a1fb9d4c45d808306 2009.1/x86_64/ncpfs-2.2.6-7.2mdv2009.1.x86_64.rpm
f9959c23aba2806c3f7fd3078b58d233 2009.1/SRPMS/ncpfs-2.2.6-7.2mdv2009.1.src.rpm

Mandriva Linux 2010.0:
f848b1bfb0d52e4dcdec0b9808ac509a 2010.0/i586/ipxutils-2.2.6-7.2mdv2010.0.i586.rpm
54aa704c0b1af11e042dcd9672de3e25 2010.0/i586/libncpfs2.3-2.2.6-7.2mdv2010.0.i586.rpm
93a2e667cd3543960897e35d2cb0cab8 2010.0/i586/libncpfs-devel-2.2.6-7.2mdv2010.0.i586.rpm
1f8d2304c8140ef4a9f86c5f91dc2503 2010.0/i586/ncpfs-2.2.6-7.2mdv2010.0.i586.rpm
832c3cf3bd76b027e3551f21c42d4e63 2010.0/SRPMS/ncpfs-2.2.6-7.2mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
7a92ccdf00e1969312ceba039a383c5b 2010.0/x86_64/ipxutils-2.2.6-7.2mdv2010.0.x86_64.rpm
090c7dfaa946377d3973e059133db67c 2010.0/x86_64/lib64ncpfs2.3-2.2.6-7.2mdv2010.0.x86_64.rpm
b3157282b6c4a3b8d2e5c996a9dc48b4 2010.0/x86_64/lib64ncpfs-devel-2.2.6-7.2mdv2010.0.x86_64.rpm
722201fa17838a7bbcf75afe9e51d0b9 2010.0/x86_64/ncpfs-2.2.6-7.2mdv2010.0.x86_64.rpm
832c3cf3bd76b027e3551f21c42d4e63 2010.0/SRPMS/ncpfs-2.2.6-7.2mdv2010.0.src.rpm

Corporate 4.0:
36221d2e2f7f7b6f1afaf8a0fbb4cc43 corporate/4.0/i586/ipxutils-2.2.6-1.2.20060mlcs4.i586.rpm
04ed54c9ef53c7b7bc8d6c5bc82875ec corporate/4.0/i586/libncpfs2.3-2.2.6-1.2.20060mlcs4.i586.rpm
ffc910168a47678c9e26b8a999eebba1 corporate/4.0/i586/libncpfs2.3-devel-2.2.6-1.2.20060mlcs4.i586.rpm
d62caa887b9a0afede029092cb94210c corporate/4.0/i586/ncpfs-2.2.6-1.2.20060mlcs4.i586.rpm
ad5fc693c4b8099f793e60fd8e362497 corporate/4.0/SRPMS/ncpfs-2.2.6-1.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
010aac4bbd8b97be07f4cf95728aa73f corporate/4.0/x86_64/ipxutils-2.2.6-1.2.20060mlcs4.x86_64.rpm
dafdc2c37fd80aa4dd23e909cb443600 corporate/4.0/x86_64/lib64ncpfs2.3-2.2.6-1.2.20060mlcs4.x86_64.rpm
82ddb2436bdf862367339606b2458373 corporate/4.0/x86_64/lib64ncpfs2.3-devel-2.2.6-1.2.20060mlcs4.x86_64.rpm
2102a419baacc322e3323a2db9b7bd0c corporate/4.0/x86_64/ncpfs-2.2.6-1.2.20060mlcs4.x86_64.rpm
ad5fc693c4b8099f793e60fd8e362497 corporate/4.0/SRPMS/ncpfs-2.2.6-1.2.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
67e97534bae7efeb19fbcc9903b6abc0 mes5/i586/ipxutils-2.2.6-6.2mdvmes5.i586.rpm
9a40d5174ab91bbce961034c60708f15 mes5/i586/libncpfs2.3-2.2.6-6.2mdvmes5.i586.rpm
5ae0613e36539f1be008969522dbaa95 mes5/i586/libncpfs-devel-2.2.6-6.2mdvmes5.i586.rpm
30b0ec51a7ab456ecaeb3d98fc6ba292 mes5/i586/ncpfs-2.2.6-6.2mdvmes5.i586.rpm
c16bd63bb48549bbee38c14b280c5d54 mes5/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

Mandriva Enterprise Server 5/X86_64:
2ea07838c868cf99959b263831cfe51f mes5/x86_64/ipxutils-2.2.6-6.2mdvmes5.x86_64.rpm
28c1d5b37556e3143badbf296e6faf59 mes5/x86_64/lib64ncpfs2.3-2.2.6-6.2mdvmes5.x86_64.rpm
5b697ab26fa6709fd6fb759c0893921e mes5/x86_64/lib64ncpfs-devel-2.2.6-6.2mdvmes5.x86_64.rpm
b9674e0cbbb6c61f711760fa05152d26 mes5/x86_64/ncpfs-2.2.6-6.2mdvmes5.x86_64.rpm
c16bd63bb48549bbee38c14b280c5d54 mes5/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

Multi Network Firewall 2.0:
8024befbd43bcf81f84103753610bbb7 mnf/2.0/i586/ipxutils-2.2.6-0.3.M20mdk.i586.rpm
d97f0d32ad39007d7b2c4634bc84fd27 mnf/2.0/i586/libncpfs2.3-2.2.6-0.3.M20mdk.i586.rpm
027010fa612a861b59e7b2fb15d7b834 mnf/2.0/i586/libncpfs2.3-devel-2.2.6-0.3.M20mdk.i586.rpm
4c0f378c6fcc6e2f44688d85435aa439 mnf/2.0/i586/ncpfs-2.2.6-0.3.M20mdk.i586.rpm
5a0d9c59bc8086de2bff5667368410e4 mnf/2.0/SRPMS/ncpfs-2.2.6-0.3.M20mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLmRzKmqjQ0CJFipgRAj8yAKCMkOkncxrNGnvpL6G1/LalaXRotwCfSSd6
4PVYweKC3SBfXc+UzESlZvc=
=7niG
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close