First published: Sun Apr 10 2011(Updated: )
ncpfs 2.2.6 and earlier attempts to use (1) ncpmount to append to the /etc/mtab file and (2) ncpumount to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ncpfs | <=2.2.6 | |
ncpfs | =2.2.1 | |
ncpfs | =2.2.2 | |
ncpfs | =2.2.3 | |
ncpfs | =2.2.4 | |
ncpfs | =2.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1679 has a medium severity due to potential local user risk of corruption of the /etc/mtab file.
To fix CVE-2011-1679, upgrade to ncpfs version 2.2.7 or later, where this vulnerability is addressed.
CVE-2011-1679 affects users running ncpfs versions 2.2.6 and earlier.
The impact of CVE-2011-1679 includes possible corruption of the /etc/mtab file, which can affect system stability.
No, CVE-2011-1679 is a local vulnerability that requires local user access to exploit.