First published: Wed Mar 25 2009(Updated: )
nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.28.9 | |
SUSE Linux | =10.3 | |
SUSE Linux | =11.0 | |
SUSE Linux | =11.1 | |
SUSE Linux Enterprise Desktop | =10-sp2 | |
SUSE Linux Enterprise Server | =10-sp2 | |
Debian | =4.0 | |
Debian | =5.0 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 | |
VMware vCenter | =4.0 | |
VMware vCenter | =2.0.2 | |
VMware vCenter | =2.5 | |
Microsoft Windows | ||
VMware Server | =2.0.0 | |
VMware ESXi | =3.0.3 | |
VMware ESXi | =3.5 | |
VMware ESXi | =4.0 | |
VMware vMA | =4.0 | |
Red Hat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1072 has been rated as a medium severity vulnerability due to its potential to allow local users to create device nodes.
To fix CVE-2009-1072, update the affected Linux kernel to version 2.6.28.9 or later.
CVE-2009-1072 affects Linux kernel versions prior to 2.6.28.9 and several older versions of openSUSE, Debian, and Ubuntu.
CVE-2009-1072 is associated with local privilege escalation attacks through unauthorized device node creation.
CVE-2009-1072 is not exploitable over the network as it requires local user access to the affected system.