First published: Thu Jan 29 2015(Updated: )
A heap buffer overflow was found in e2fsprgos lib/ext2fs/openfs.c. It allows a trivial arbitrary memory write under certain conditions. Given that fsck is affected, and that an ext2/3/4 image can force a filesystem check on mount, this will allow code execution on systems that have automount enabled by just plugging a device. Acknowledgements: Red Hat would like to thank oCERT for reporting these issues. oCERT acknowledges Jose Duart of the Google Security Team as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/e2fsprogs | <1.42.12 | 1.42.12 |
e2fsprogs | <=1.42.11 | |
Debian Linux | =7.0 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Red Hat Fedora | =20 | |
Red Hat Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0247 is classified as a critical severity vulnerability due to its potential for arbitrary memory writing and code execution.
To resolve CVE-2015-0247, upgrade the e2fsprogs package to version 1.42.12 or higher.
CVE-2015-0247 affects multiple versions of e2fsprogs and operating systems like Debian 7.0 and various Ubuntu versions up to 14.10.
Yes, CVE-2015-0247 can potentially be exploited remotely due to its impact on automounting ext2/3/4 file systems.
If CVE-2015-0247 is exploited, it can lead to arbitrary code execution within affected systems.