Advisory Published
Updated

REDHAT-BUG-559579

First published: Thu Jan 28 2010(Updated: )

It was found that glibc's utility, responsible for editing of system's mtab table, improperly sanitized user supplied mount point names containing certain special character. Local attacker could use this flaw to add arbitrary mount points (corrupt system's "/etc/mtab" file) or, potentially, set unauthorized mount options. Other attacks are also possible. Issue severity note: ------------------- The /etc/mtab file handles mounted devices and is automatically updated by the mount command (more precisely by the dedicated "mount" tool for relevant filesystem). Unprivileged user to be able to run such a tool (and modify content of /etc/mtab), this tool needs to be suid root enabled. The dedicated "mount" tools, as shipped with Red Hat Enterprise Linux (mount.cifs, mount.fuse, fusermount, mount.nfs, mount.nfs4) does NOT allow unprivileged user to use them (without prior grant of additional privileges from the privileged user) for editing of system's /etc/mtab file, which mitigates impact of this flaw.

Affected SoftwareAffected VersionHow to fix
GNU C Library (glibc)
Red Hat Enterprise Linux

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of REDHAT-BUG-559579?

    The severity of REDHAT-BUG-559579 is considered to be high, as it allows local attackers to manipulate the mtab file.

  • How do I fix REDHAT-BUG-559579?

    To fix REDHAT-BUG-559579, you should upgrade to the latest version of glibc that resolves this vulnerability.

  • Who is affected by REDHAT-BUG-559579?

    REDHAT-BUG-559579 affects systems running the GNU C Library (glibc) and Red Hat Enterprise Linux.

  • What is the nature of the vulnerability in REDHAT-BUG-559579?

    The vulnerability in REDHAT-BUG-559579 is due to improper sanitization of user-supplied mount point names in the mtab file.

  • Can REDHAT-BUG-559579 be exploited remotely?

    No, REDHAT-BUG-559579 requires local access for an attacker to exploit the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203