// For flags

CVE-2007-5191

util-linux (u)mount doesn't drop privileges properly when calling helpers

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.

El montaje y desmontaje en util-linux y loop-aes-utils, llaman a las funciones setuid y setgid en el orden incorrecto y no comprueban los valores de retorno, lo que podrĂ­a permitir a atacantes alcanzar privilegios por medio de asistentes como mount.nfs.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-10-04 CVE Reserved
  • 2007-10-04 CVE Published
  • 2024-05-23 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-252: Unchecked Return Value
CAPEC
References (35)
URL Tag Source
http://bugs.gentoo.org/show_bug.cgi?id=195390 Issue Tracking
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=commit%3Bh=ebbeb2c7ac1b00b6083905957837a271e80b187e X_refsource_confirm
http://lists.vmware.com/pipermail/security-announce/2008/000002.html Mailing List
http://secunia.com/advisories/27104 Third Party Advisory
http://secunia.com/advisories/27122 Third Party Advisory
http://secunia.com/advisories/27145 Third Party Advisory
http://secunia.com/advisories/27188 Third Party Advisory
http://secunia.com/advisories/27283 Third Party Advisory
http://secunia.com/advisories/27354 Third Party Advisory
http://secunia.com/advisories/27399 Third Party Advisory
http://secunia.com/advisories/27687 Third Party Advisory
http://secunia.com/advisories/28348 Third Party Advisory
http://secunia.com/advisories/28349 Third Party Advisory
http://secunia.com/advisories/28368 Third Party Advisory
http://secunia.com/advisories/28469 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-023.htm Third Party Advisory
http://www.securityfocus.com/archive/1/485936/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/486859/100/0/threaded Mailing List
http://www.securityfocus.com/bid/25973 Third Party Advisory
http://www.securitytracker.com/id?1018782 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2008-0001.html Third Party Advisory
http://www.vupen.com/english/advisories/2007/3417 Third Party Advisory
http://www.vupen.com/english/advisories/2008/0064 Third Party Advisory
https://issues.rpath.com/browse/RPL-1757 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10101 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Kernel
Search vendor "Kernel"
Util-linux
Search vendor "Kernel" for product "Util-linux"
<= 2.13.1.1
Search vendor "Kernel" for product "Util-linux" and version " <= 2.13.1.1"
-
Affected
Loop-aes-utils Project
Search vendor "Loop-aes-utils Project"
Loop-aes-utils
Search vendor "Loop-aes-utils Project" for product "Loop-aes-utils"
--
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
7
Search vendor "Fedoraproject" for product "Fedora" and version "7"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.06
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.04"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
3.1
Search vendor "Debian" for product "Debian Linux" and version "3.1"
-
Affected