Vulnerabilities > CVE-2007-0822 - Unspecified vulnerability in Linux Kernel 2.6.15
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN linux
nessus
Summary
umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Nessus
NASL family | Mandriva Local Security Checks |
NASL id | MANDRAKE_MDKSA-2007-053.NASL |
description | Umount allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents. Updated packages have been patched to address this issue. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24779 |
published | 2007-03-07 |
reporter | This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24779 |
title | Mandrake Linux Security Advisory : util-linux (MDKSA-2007:053) |
code |
|
Statements
contributor | Mark J Cox |
lastmodified | 2007-02-09 |
organization | Red Hat |
statement | Red Hat does not consider this issue to be a security vulnerability. On Red Hat Enterprise Linux processes that change their effective UID do not dump core by default when they receive a fatal signal. Therefore the NULL pointer dereference does not lead to an information leak. |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0012.html
- http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0012.html
- http://gotfault.wordpress.com/2007/01/18/umount-bug/
- http://gotfault.wordpress.com/2007/01/18/umount-bug/
- http://osvdb.org/33652
- http://osvdb.org/33652
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:053
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:053
- http://www.securityfocus.com/bid/22850
- http://www.securityfocus.com/bid/22850
- http://www.securitytracker.com/id?1017729
- http://www.securitytracker.com/id?1017729