First published: Wed Jul 07 2010(Updated: )
Description of problem: CIFS has the ability to chase MS-DFS referrals. In order to do this it has to be able to resolve hostnames into IP addresses. For this, it uses the keys API to upcall to the cifs.upcall userspace helper. It then resolves the name and hands the address back to the kernel. The dns_resolver upcall currently used by CIFS is susceptible to cache stuffing. It's possible for a malicious user to stuff the keyring with the results of a lookup, and then trick the server into mounting a server of his choosing.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.35 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2524 has a medium severity rating due to potential security implications in CIFS handling of MS-DFS referrals.
To fix CVE-2010-2524, ensure your system is updated with the latest kernel patches that address this vulnerability.
CVE-2010-2524 affects various versions of the Linux kernel and VMware ESX, along with several Ubuntu and SUSE Linux distributions.
CVE-2010-2524 could potentially allow an attacker to exploit the CIFS functionality, leading to unauthorized access or denial of service.
While CVE-2010-2524 was a notable vulnerability, modern systems with updated kernels should have mitigated its risks significantly.