First published: Thu Nov 24 2011(Updated: )
It was discovered that CIFS incorrectly handled authentication. When a user had a CIFS share mounted that required authentication, a local user could mount the same share without knowing the correct password. (CVE-2011-1585) Robert Swiecki discovered that mapping extensions were incorrectly handled. A local attacker could exploit this to crash the system, leading to a denial of service. (CVE-2011-2496)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.35-903-omap4 | <2.6.35-903.27 | 2.6.35-903.27 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-1280-1 is considered to be high due to improper authentication handling in CIFS.
To fix USN-1280-1, users should upgrade to the updated package version that addresses the CIFS authentication vulnerability.
USN-1280-1 affects Ubuntu 10.10 systems running the linux-image-2.6.35-903-omap4 package version up to 2.6.35-903.27.
CVE-2011-1585 is the identifier for the vulnerability exploited in USN-1280-1, which involves incorrect handling of CIFS authentication.
Yes, a local user could potentially exploit the USN-1280-1 vulnerability to mount a CIFS share without knowing the correct password.