First published: Tue Aug 09 2011(Updated: )
A number of flaws were reported [1] in eCryptfs that could allow a user to mount or unmount arbitrary locations, and possibly disclose confidential information: Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested mountpoint. A local attacker could use this flaw to mount to arbitrary locations, leading to privilege escalation. (<a href="https://access.redhat.com/security/cve/CVE-2011-1831">CVE-2011-1831</a>) Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested mountpoint. A local attacker could use this flaw to unmount to arbitrary locations, leading to a denial of service. (<a href="https://access.redhat.com/security/cve/CVE-2011-1832">CVE-2011-1832</a>) Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs incorrectly validated permissions on the requested source directory. A local attacker could use this flaw to mount an arbitrary directory, possibly leading to information disclosure. Note that this flaw also requires a fix in the kernel to be complete. (<a href="https://access.redhat.com/security/cve/CVE-2011-1833">CVE-2011-1833</a>) Dan Rosenberg and Marc Deslauriers discovered that eCryptfs incorrectly handled modifications to the mtab file when an error occurs. A local attacker could use this flaw to corrupt the mtab file, and possibly unmount arbitrary locations, leading to a denial of service. (<a href="https://access.redhat.com/security/cve/CVE-2011-1834">CVE-2011-1834</a>) Marc Deslauriers discovered that eCryptfs incorrectly handled keys when setting up an encrypted private directory. A local attacker could use this flaw to manipulate keys during creation of a new user. (<a href="https://access.redhat.com/security/cve/CVE-2011-1835">CVE-2011-1835</a>) Marc Deslauriers discovered that eCryptfs incorrectly handled permissions during recovery. A local attacker could use this flaw to possibly access another user's data during the recovery process. (<a href="https://access.redhat.com/security/cve/CVE-2011-1836">CVE-2011-1836</a>) Vasiliy Kulikov of Openwall discovered that eCryptfs incorrectly handled lock counters. A local attacker could use this flaw to possibly overwrite arbitrary files. (<a href="https://access.redhat.com/security/cve/CVE-2011-1837">CVE-2011-1837</a>) [1] <a href="https://launchpad.net/bugs/732628">https://launchpad.net/bugs/732628</a>
Credit: security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ecryptfs-utils | 111-5 111-6 111-7 | |
eCryptfs-utils | <=89 | |
eCryptfs-utils | =62 | |
eCryptfs-utils | =63 | |
eCryptfs-utils | =64 | |
eCryptfs-utils | =65 | |
eCryptfs-utils | =66 | |
eCryptfs-utils | =67 | |
eCryptfs-utils | =68 | |
eCryptfs-utils | =69 | |
eCryptfs-utils | =70 | |
eCryptfs-utils | =71 | |
eCryptfs-utils | =72 | |
eCryptfs-utils | =73 | |
eCryptfs-utils | =74 | |
eCryptfs-utils | =75 | |
eCryptfs-utils | =76 | |
eCryptfs-utils | =77 | |
eCryptfs-utils | =78 | |
eCryptfs-utils | =79 | |
eCryptfs-utils | =80 | |
eCryptfs-utils | =81 | |
eCryptfs-utils | =82 | |
eCryptfs-utils | =83 | |
eCryptfs-utils | =84 | |
eCryptfs-utils | =85 | |
eCryptfs-utils | =86 | |
eCryptfs-utils | =87 | |
eCryptfs-utils | =58 | |
eCryptfs-utils | =59 | |
eCryptfs-utils | =60 | |
eCryptfs-utils | =61 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1831 has been classified with a medium severity level due to potential unauthorized access and information disclosure risks.
To fix CVE-2011-1831, update eCryptfs-utils to the latest version available that addresses this vulnerability.
CVE-2011-1831 was discovered by Vasiliy Kulikov of Openwall and Dan Rosenberg.
CVE-2011-1831 affects multiple versions of eCryptfs-utils including versions 58 through 89.
CVE-2011-1831 represents a flaw in permission validation in eCryptfs that could lead to unauthorized mount access.