First published: Thu Jan 28 2010(Updated: )
It was found that glibc's utility, responsible for editing of system's mtab table, improperly sanitized user supplied mount point names containing certain special character. Local attacker could use this flaw to add arbitrary mount points (corrupt system's "/etc/mtab" file) or, potentially, set unauthorized mount options. Other attacks are also possible. Issue severity note: ------------------- The /etc/mtab file handles mounted devices and is automatically updated by the mount command (more precisely by the dedicated "mount" tool for relevant filesystem). Unprivileged user to be able to run such a tool (and modify content of /etc/mtab), this tool needs to be suid root enabled. The dedicated "mount" tools, as shipped with Red Hat Enterprise Linux (mount.cifs, mount.fuse, fusermount, mount.nfs, mount.nfs4) does NOT allow unprivileged user to use them (without prior grant of additional privileges from the privileged user) for editing of system's /etc/mtab file, which mitigates impact of this flaw.
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | ||
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-559579 is considered to be high, as it allows local attackers to manipulate the mtab file.
To fix REDHAT-BUG-559579, you should upgrade to the latest version of glibc that resolves this vulnerability.
REDHAT-BUG-559579 affects systems running the GNU C Library (glibc) and Red Hat Enterprise Linux.
The vulnerability in REDHAT-BUG-559579 is due to improper sanitization of user-supplied mount point names in the mtab file.
No, REDHAT-BUG-559579 requires local access for an attacker to exploit the vulnerability.