// For flags

CVE-2007-0004

 

Severity Score

1.9
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The NFS client implementation in the kernel in Red Hat Enterprise Linux (RHEL) 3, when a filesystem is mounted with the noacl option, checks permissions for the open system call via vfs_permission (mode bits) data rather than an NFS ACCESS call to the server, which allows local client processes to obtain a false success status from open calls that the server would deny, and possibly obtain sensitive information about file permissions on the server, as demonstrated in a root_squash environment. NOTE: it is uncertain whether any scenarios involving this issue cross privilege boundaries.

La implementación del cliente NFS en el núcleo de Red Hat Enterprise Linux (RHEL) 3, cuando un sistema de ficheros se monta con la opción noacl, comprueba los permisos para la llamada al sistema open mediante la información vfs_permission (bits de modo o mode bits) en lugar de una llamada NFS ACCESS al servidor, lo cual permite a procesos cliente locales obtener un falso estado de éxito de llamadas a open que el servidor denegaría, y posiblemente obtener información sensible sobre los permisos de fichero en el servidor, como se ha demostrado en un entorno root_squash. NOTA: no está claro si cualquier escenario involucrando este problema cruzan los límites de la seguridad.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-12-19 CVE Reserved
  • 2007-09-18 CVE Published
  • 2024-04-25 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (1)
URL Tag Source
https://bugzilla.redhat.com/show_bug.cgi?id=199715 X_refsource_confirm
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
3.0
Search vendor "Redhat" for product "Enterprise Linux" and version "3.0"
-
Affected