First published: Sat Dec 31 2005(Updated: )
The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dragonfly Project | <=1.2 | |
FreeBSD Kernel | <=6.0 | |
FreeBSD Kernel | =7.0-current | |
Linux Kernel | <=2.6.15 | |
OpenBSD | <=3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4351 is considered a high-severity vulnerability due to its potential to allow unauthorized access to immutable files by root users.
To fix CVE-2005-4351, it is recommended to upgrade to the latest stable versions of FreeBSD, OpenBSD, DragonFly, or Linux kernel that patched this vulnerability.
CVE-2005-4351 affects FreeBSD 6.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15.
Attackers can exploit CVE-2005-4351 by mounting a filesystem that masks immutable files while the operating system is running.
To mitigate CVE-2005-4351 without upgrading, administrators should limit root access and avoid mounting new filesystems that could expose immutable files.