First published: Sun Jan 06 2013(Updated: )
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
util-linux mount | =2.14.1 | |
util-linux mount | =2.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0157 has a low severity rating as it allows local users to enumerate restricted directories but does not lead to direct code execution.
To fix CVE-2013-0157, ensure that you update util-linux to a version that addresses this vulnerability.
CVE-2013-0157 affects util-linux versions 2.14.1 and 2.17.2 specifically, among possibly other versions.
Local users can exploit CVE-2013-0157 by using the --guess-fstype option or by attempting to mount a non-existent device.
No, CVE-2013-0157 does not require remote access as it can be exploited locally.