First published: Mon Oct 03 2011(Updated: )
A race condition was found in the way 'mount.cifs' and 'umount.cifs' utilities performed mount / umount of a particular CIFS share to / from specified mount point (/etc/mtab~ lockfile was created before updating the /etc/mtab file and deleted once the operation completed), when these utilies were setuid root enabled. A local attacker could use this flaw to conduct denial of service attacks (failure of subsequent CIFS share umount / mount requests) by sending termination signal to 'mount.cifs' / 'umount.cifs' processes in the moment of existence of a stale (/etc/mtab~) lockfile. References: [1] <a href="https://bugzilla.samba.org/show_bug.cgi?id=7179">https://bugzilla.samba.org/show_bug.cgi?id=7179</a> (upstream bug report) [2] <a href="http://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=810f7e4e0f2dbcbee0294d9b371071cb08268200">http://git.samba.org/?p=cifs-utils.git;a=commitdiff;h=810f7e4e0f2dbcbee0294d9b371071cb08268200</a> (upstream patch) [3] <a href="http://www.openwall.com/lists/oss-security/2011/09/27/1">http://www.openwall.com/lists/oss-security/2011/09/27/1</a> (CVE request) [4] <a href="http://www.openwall.com/lists/oss-security/2011/09/30/5">http://www.openwall.com/lists/oss-security/2011/09/30/5</a> (CVE assignment) Note: This flaw to be exploitable as described above requires the 'mount.cifs' / 'umount.cifs' utilities to be setuid root enabled. These utilities are not setuid root enabled on Red Hat Enterprise Linux and Fedora distributions, and thus these distributions as such are not vulnerable to this flaw.
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Client |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.