Vulnerabilities > CVE-2007-5964 - Configuration vulnerability in Redhat Enterprise Linux 5.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the nosuid option for the hosts (/net filesystem) map, which allows local users to gain privileges via a setuid program on a remote NFS server.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family Fedora Local Security Checks NASL id FEDORA_2007-4707.NASL description - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> - 5.0.2-24 - Bug 426400: CVE-2007-6285 autofs default doesn last seen 2020-06-01 modified 2020-06-02 plugin id 29767 published 2007-12-24 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29767 title Fedora 8 : autofs-5.0.2-24 (2007-4707) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2007-4707. # include("compat.inc"); if (description) { script_id(29767); script_version ("1.15"); script_cvs_date("Date: 2019/08/02 13:32:26"); script_cve_id("CVE-2007-6285"); script_bugtraq_id(26970); script_xref(name:"FEDORA", value:"2007-4707"); script_name(english:"Fedora 8 : autofs-5.0.2-24 (2007-4707)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> - 5.0.2-24 - Bug 426400: CVE-2007-6285 autofs default doesn't set nodev in /net [f8] - use mount option 'nodev' for '-hosts' map unless 'dev' is explicily specified. - Tue Dec 18 2007 Ian Kent <ikent at redhat.com> - 5.0.2-22 - Bug 397591 SELinux is preventing /sbin/rpc.statd (rpcd_t) 'search' to <Unknown> (sysctl_fs_t). - prevent fork between fd open and setting of FD_CLOEXEC. - Thu Dec 13 2007 Ian Kent <ikent at redhat.com> - 5.0.2-20 - Bug 409701: CVE-2007-5964 Privilege Escalation (from local system) through /net autofs mount configuration bug - use mount option 'nosuid' for '-hosts' map unless 'suid' is explicily specified. - Tue Nov 20 2007 Ian Kent <ikent at redhat.com> - 5.0.2-17 - fix schema selection in LDAP schema discovery. - check for '*' when looking up wildcard in LDAP. - fix couple of edge case parse fails of timeout option. - add SEARCH_BASE configuration option. - add random selection as a master map entry option. - re-read config on HUP signal. - add LDAP_URI, LDAP_TIMEOUT and LDAP_NETWORK_TIMEOUT configuration options. - fix deadlock in submount mount module. - fix lack of ferror() checking when reading files. - fix typo in autofs(5) man page. - fix map entry expansion when undefined macro is present. - remove unused export validation code. - add dynamic logging (adapted from v4 patch from Jeff Moyer). - fix recursive loopback mounts (Matthias Koenig). - add map re-load to verbose logging. - fix handling of LDAP base dns with spaces. - handle MTAB_NOTUPDATED status return from mount. - when default master map, auto.master, is used also check for auto_master. - update negative mount timeout handling. - fix large group handling (Ryan Thomas). - fix for dynamic logging breaking non-sasl build (Guillaume Rousse). - eliminate NULL proc ping for singleton host or local mounts. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); # https://lists.fedoraproject.org/pipermail/package-announce/2007-December/006188.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?4b431d1d" ); script_set_attribute( attribute:"solution", value:"Update the affected autofs and / or autofs-debuginfo packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:8"); script_set_attribute(attribute:"patch_publication_date", value:"2007/12/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/24"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 8.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC8", reference:"autofs-5.0.2-24")) flag++; if (rpm_check(release:"FC8", reference:"autofs-debuginfo-5.0.2-24")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs / autofs-debuginfo"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2007-4709.NASL description - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> - 5.0.1-31 - Bug 426399: CVE-2007-6285 autofs default doesn last seen 2020-06-01 modified 2020-06-02 plugin id 29768 published 2007-12-24 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29768 title Fedora 7 : autofs-5.0.1-31 (2007-4709) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2007-4709. # include("compat.inc"); if (description) { script_id(29768); script_version ("1.16"); script_cvs_date("Date: 2019/08/02 13:32:26"); script_cve_id("CVE-2007-6285"); script_bugtraq_id(26970); script_xref(name:"FEDORA", value:"2007-4709"); script_name(english:"Fedora 7 : autofs-5.0.1-31 (2007-4709)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: " - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> - 5.0.1-31 - Bug 426399: CVE-2007-6285 autofs default doesn't set nodev in /net [f7] - use mount option 'nodev' for '-hosts' map unless 'dev' is explicily specified. - Tue Dec 18 2007 Ian Kent <ikent at redhat.com> - 5.0.1-30 - Bug 397591 SELinux is preventing /sbin/rpc.statd (rpcd_t) 'search' to <Unknown> (sysctl_fs_t). - prevent fork between fd open and setting of FD_CLOEXEC. - Thu Dec 13 2007 Ian Kent <ikent at redhat.com> - 5.0.1-29 - Bug 421351: CVE-2007-5964 autofs defaults don't restrict suid in /net [f7] - use mount option 'nosuid' for '-hosts' map unless 'suid' is explicily specified. - Wed Sep 5 2007 Ian Kent <ikent at redhat.com> - 5.0.1-28 - add ldaps support (required by schema discovery). - add back LDAP schema discovery if no schema is configured. - Tue Aug 28 2007 Ian Kent <ikent at redhat.com> - 5.0.1-26 - fix 'nosymlink' option handling and add desription to man page. - update patch to prevent failure on empty master map. - if there's no 'automount' entry in nsswitch.conf use 'files' source. - add LDAP schema discovery if no schema is configured. - Tue Aug 21 2007 Ian Kent <ikent at redhat.com> - 5.0.1-25 - change random multiple server selection option name to be consistent with upstream naming. - Tue Aug 21 2007 Ian Kent <ikent at redhat.com> - 5.0.1-24 - don't fail on empty master map. - allow for older schemas that allow '*' as a key value. - add support for the '%' hack for case insensitive attribute schemas. - Mon Jul 30 2007 Ian Kent <ikent at redhat.com> - 5.0.1-23 - mark map instances stale so they aren't 'cleaned' during updates. - fix large file compile time option. - Fri Jul 27 2007 Ian Kent <ikent at redhat.com> - 5.0.1-22 - fix version passed to get_supported_ver_and_cost (bz 249574). - Tue Jul 24 2007 Ian Kent <ikent at redhat.com> - 5.0.1-21 - fix parse confusion between attribute and attribute value. - Fri Jul 20 2007 Ian Kent <ikent at redhat.com> - 5.0.1-20 - fix handling of quoted slash alone (bz 248943). - Wed Jul 18 2007 Ian Kent <ikent at redhat.com> - 5.0.1-19 - fix wait time resolution in alarm and state queue handlers (bz 247711). - Mon Jul 16 2007 Ian Kent <ikent at redhat.com> - 5.0.1-18 - correct man page of patch which added mount options append control. - Mon Jul 16 2007 Ian Kent <ikent at redhat.com> - 5.0.1-17 - fix mount point directory creation for bind mounts. - add quoting for exports gathered by hosts map. - Thu Jun 7 2007 Ian Kent <ikent at redhat.com> - 5.0.1-13 - fix deadlock in alarm manager module. - Sun Jun 3 2007 Ian Kent <ikent at redhat.com> - 5.0.1-11 - correct mistake in logic test in wildcard lookup. - Mon May 7 2007 Ian Kent <ikent at redhat.com> - 5.0.1-10 - fix master map lexer to admit '.' in macro values. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=426399" ); # https://lists.fedoraproject.org/pipermail/package-announce/2007-December/006194.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?cd21c796" ); script_set_attribute( attribute:"solution", value:"Update the affected autofs and / or autofs-debuginfo packages." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:7"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/20"); script_set_attribute(attribute:"patch_publication_date", value:"2007/12/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/24"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 7.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC7", reference:"autofs-5.0.1-31")) flag++; if (rpm_check(release:"FC7", reference:"autofs-debuginfo-5.0.1-31")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs / autofs-debuginfo"); }
NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-1177.NASL description From Red Hat Security Advisory 2007:1177 : Updated autofs5 technology preview packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. The autofs5 packages were made available as a technology preview in Red Hat Enterprise Linux 4.6. There was a security issue with the default configuration of autofs version 5, whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 67628 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67628 title Oracle Linux 4 : autofs5 (ELSA-2007-1177) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2007:1177 and # Oracle Linux Security Advisory ELSA-2007-1177 respectively. # include("compat.inc"); if (description) { script_id(67628); script_version("1.8"); script_cvs_date("Date: 2019/10/25 13:36:07"); script_cve_id("CVE-2007-6285"); script_bugtraq_id(26970); script_xref(name:"RHSA", value:"2007:1177"); script_name(english:"Oracle Linux 4 : autofs5 (ELSA-2007-1177)"); script_summary(english:"Checks rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Oracle Linux host is missing a security update." ); script_set_attribute( attribute:"description", value: "From Red Hat Security Advisory 2007:1177 : Updated autofs5 technology preview packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. The autofs5 packages were made available as a technology preview in Red Hat Enterprise Linux 4.6. There was a security issue with the default configuration of autofs version 5, whereby the entry for the '-hosts' map did not specify the 'nodev' mount option. A local user with control of a remote NFS server could create special device files on the remote file system, that if mounted using the default '-hosts' map, could allow the user to access important system devices. (CVE-2007-6285) This issue is similar to CVE-2007-5964, which fixed a missing 'nosuid' mount option in autofs. Both the 'nodev' and 'nosuid' options should be enabled to prevent a possible compromise of machine integrity. Due to the fact that autofs always mounted '-hosts' map entries 'dev' by default, autofs has now been altered to always use the 'nodev' option when mounting from the default '-hosts' map. The 'dev' option must be explicitly given in the master map entry to revert to the old behavior. This change affects only the '-hosts' map which corresponds to the '/net' entry in the default configuration. All autofs5 users are advised to upgrade to these updated packages, which resolve this issue. Red Hat would like to thank Tim Baum for reporting this issue." ); script_set_attribute( attribute:"see_also", value:"https://oss.oracle.com/pipermail/el-errata/2007-December/000461.html" ); script_set_attribute( attribute:"solution", value:"Update the affected autofs5 package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:autofs5"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:4"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/20"); script_set_attribute(attribute:"patch_publication_date", value:"2007/12/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Oracle Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux"); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux"); os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux"); os_ver = os_ver[1]; if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 4", "Oracle Linux " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu); flag = 0; if (rpm_check(release:"EL4", cpu:"i386", reference:"autofs5-5.0.1-0.rc2.55.el4_6.2")) flag++; if (rpm_check(release:"EL4", cpu:"x86_64", reference:"autofs5-5.0.1-0.rc2.55.el4_6.2")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs5"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-1128.NASL description Updated autofs packages are now available to fix a security flaw for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 29692 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29692 title RHEL 5 : autofs (RHSA-2007:1128) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2007:1128. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(29692); script_version ("1.23"); script_cvs_date("Date: 2019/10/25 13:36:13"); script_cve_id("CVE-2007-5964"); script_bugtraq_id(26841); script_xref(name:"RHSA", value:"2007:1128"); script_name(english:"RHEL 5 : autofs (RHSA-2007:1128)"); script_summary(english:"Checks the rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing a security update." ); script_set_attribute( attribute:"description", value: "Updated autofs packages are now available to fix a security flaw for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the 'hosts' map did not specify the 'nosuid' mount option. A local user with control of a remote nfs server could create a setuid root executable within an exported filesystem on the remote nfs server that, if mounted using the default hosts map, would allow the user to gain root privileges. (CVE-2007-5964) Due to the fact that autofs always mounted hosts map entries suid by default, autofs has now been altered to always use the 'nosuid' option when mounting from the default hosts map. The 'suid' option must be explicitly given in the master map entry to revert to the old behavior. This change affects only the hosts map which corresponds to the /net entry in the default configuration. Users are advised to upgrade to these updated autofs packages, which resolve this issue. Red Hat would like to thank Josh Lange for reporting this issue." ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2007-5964" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2007:1128" ); script_set_attribute( attribute:"solution", value:"Update the affected autofs package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:autofs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.1"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/13"); script_set_attribute(attribute:"patch_publication_date", value:"2007/12/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/13"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2007:1128"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (rpm_check(release:"RHEL5", cpu:"i386", reference:"autofs-5.0.1-0.rc2.55.el5.1")) flag++; if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"autofs-5.0.1-0.rc2.55.el5.1")) flag++; if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"autofs-5.0.1-0.rc2.55.el5.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs"); } }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-1176.NASL description Updated autofs packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. There was a security issue with the default configuration of autofs version 5, whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 29777 published 2007-12-24 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29777 title RHEL 5 : autofs (RHSA-2007:1176) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2007:1176. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(29777); script_version ("1.23"); script_cvs_date("Date: 2019/10/25 13:36:13"); script_cve_id("CVE-2007-6285"); script_bugtraq_id(26970); script_xref(name:"RHSA", value:"2007:1176"); script_name(english:"RHEL 5 : autofs (RHSA-2007:1176)"); script_summary(english:"Checks the rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing a security update." ); script_set_attribute( attribute:"description", value: "Updated autofs packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. There was a security issue with the default configuration of autofs version 5, whereby the entry for the '-hosts' map did not specify the 'nodev' mount option. A local user with control of a remote NFS server could create special device files on the remote file system, that if mounted using the default '-hosts' map, could allow the user to access important system devices. (CVE-2007-6285) This issue is similar to CVE-2007-5964, which fixed a missing 'nosuid' mount option in autofs. Both the 'nodev' and 'nosuid' options should be enabled to prevent a possible compromise of machine integrity. Due to the fact that autofs always mounted '-hosts' map entries 'dev' by default, autofs has now been altered to always use the 'nodev' option when mounting from the default '-hosts' map. The 'dev' option must be explicitly given in the master map entry to revert to the old behavior. This change affects only the '-hosts' map which corresponds to the '/net' entry in the default configuration. All autofs users are advised to upgrade to these updated packages, which resolve this issue. Red Hat would like to thank Tim Baum for reporting this issue." ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2007-6285" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2007:1176" ); script_set_attribute( attribute:"solution", value:"Update the affected autofs package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:autofs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.1"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/20"); script_set_attribute(attribute:"patch_publication_date", value:"2007/12/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/24"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2007:1176"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (rpm_check(release:"RHEL5", cpu:"i386", reference:"autofs-5.0.1-0.rc2.55.el5.2")) flag++; if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"autofs-5.0.1-0.rc2.55.el5.2")) flag++; if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"autofs-5.0.1-0.rc2.55.el5.2")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs"); } }
NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-1128.NASL description Updated autofs packages are now available to fix a security flaw for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 43663 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43663 title CentOS 5 : autofs (CESA-2007:1128) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2007:1128 and # CentOS Errata and Security Advisory 2007:1128 respectively. # include("compat.inc"); if (description) { script_id(43663); script_version("1.13"); script_cvs_date("Date: 2019/10/25 13:36:04"); script_cve_id("CVE-2007-5964"); script_bugtraq_id(26841); script_xref(name:"RHSA", value:"2007:1128"); script_name(english:"CentOS 5 : autofs (CESA-2007:1128)"); script_summary(english:"Checks rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote CentOS host is missing a security update." ); script_set_attribute( attribute:"description", value: "Updated autofs packages are now available to fix a security flaw for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the 'hosts' map did not specify the 'nosuid' mount option. A local user with control of a remote nfs server could create a setuid root executable within an exported filesystem on the remote nfs server that, if mounted using the default hosts map, would allow the user to gain root privileges. (CVE-2007-5964) Due to the fact that autofs always mounted hosts map entries suid by default, autofs has now been altered to always use the 'nosuid' option when mounting from the default hosts map. The 'suid' option must be explicitly given in the master map entry to revert to the old behavior. This change affects only the hosts map which corresponds to the /net entry in the default configuration. Users are advised to upgrade to these updated autofs packages, which resolve this issue. Red Hat would like to thank Josh Lange for reporting this issue." ); # https://lists.centos.org/pipermail/centos-announce/2007-December/014507.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?66c19c38" ); # https://lists.centos.org/pipermail/centos-announce/2007-December/014508.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?1482a191" ); script_set_attribute( attribute:"solution", value:"Update the affected autofs package." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(16); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:autofs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:5"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/13"); script_set_attribute(attribute:"patch_publication_date", value:"2007/12/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2010/01/06"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"CentOS Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/CentOS/release"); if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS"); os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS"); os_ver = os_ver[1]; if (! preg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 5.x", "CentOS " + os_ver); if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu); flag = 0; if (rpm_check(release:"CentOS-5", reference:"autofs-5.0.1-0.rc2.55.el5.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs"); }
NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-1129.NASL description From Red Hat Security Advisory 2007:1129 : Updated Red Hat Enterprise Linux 4 Technology Preview autofs5 packages are now available to fix a security flaw. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. The autofs version 5 package was made available as a technology preview in Red Hat Enterprise Linux version 4.6. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 67622 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67622 title Oracle Linux 4 : autofs5 (ELSA-2007-1129) NASL family Scientific Linux Local Security Checks NASL id SL_20071212_AUTOFS_ON_SL5_X.NASL description There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 60330 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60330 title Scientific Linux Security Update : autofs on SL5.x i386/x86_64 NASL family Fedora Local Security Checks NASL id FEDORA_2007-4469.NASL description - Thu Dec 13 2007 Ian Kent <ikent at redhat.com> - 5.0.1-29 - Bug 421351: CVE-2007-5964 autofs defaults don last seen 2020-06-01 modified 2020-06-02 plugin id 29713 published 2007-12-17 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29713 title Fedora 7 : autofs-5.0.1-29 (2007-4469) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-1176.NASL description Updated autofs packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. There was a security issue with the default configuration of autofs version 5, whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 43665 published 2010-01-06 reporter This script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/43665 title CentOS 5 : autofs (CESA-2007:1176) NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2008-009.NASL description The default behaviour of autofs 5 for the hosts map did not specify the nosuid and nodev mount options. This could allow a local user with control of a remote NFS server to create a setuid root executable on the exported filesystem of the remote NFS server. If this filesystem was mounted with the default hosts map, it would allow the user to obtain root privileges (CVE-2007-5964). Likewise, the same scenario would be available for local users able to create device files on the exported filesystem which could allow the user to gain access to important system devices (CVE-2007-6285). Because the default behaviour of autofs was to mount -hosts map entries with the dev and suid options enabled by default, autofs has been altered to always use nodev and nosuid by default. In order to have the old behaviour, the configuration must now explicitly set the dev and/or suid options. This change only affects the -hosts map which corresponds to the /net entry in the default configuration. Update : The previous update shipped with an incorrect LDAP lookup module that would prevent the automount daemon from starting. This update corrects that problem. last seen 2020-06-01 modified 2020-06-02 plugin id 37526 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37526 title Mandriva Linux Security Advisory : autofs (MDVSA-2008:009-1) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-1177.NASL description Updated autofs5 technology preview packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. The autofs5 packages were made available as a technology preview in Red Hat Enterprise Linux 4.6. There was a security issue with the default configuration of autofs version 5, whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 29778 published 2007-12-24 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29778 title RHEL 4 : autofs5 (RHSA-2007:1177) NASL family Fedora Local Security Checks NASL id FEDORA_2007-4532.NASL description - Thu Dec 13 2007 Ian Kent <ikent at redhat.com> - 5.0.2-20 - Bug 409701: CVE-2007-5964 Privilege Escalation (from local system) through /net autofs mount configuration bug - use mount option last seen 2020-06-01 modified 2020-06-02 plugin id 29715 published 2007-12-17 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29715 title Fedora 8 : autofs-5.0.2-20 (2007-4532) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2007-1129.NASL description Updated Red Hat Enterprise Linux 4 Technology Preview autofs5 packages are now available to fix a security flaw. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. The autofs version 5 package was made available as a technology preview in Red Hat Enterprise Linux version 4.6. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 29693 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29693 title RHEL 4 : autofs5 (RHSA-2007:1129) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-1176.NASL description From Red Hat Security Advisory 2007:1176 : Updated autofs packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. There was a security issue with the default configuration of autofs version 5, whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 67627 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67627 title Oracle Linux 5 : autofs (ELSA-2007-1176) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-1129.NASL description Updated Red Hat Enterprise Linux 4 Technology Preview autofs5 packages are now available to fix a security flaw. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. The autofs version 5 package was made available as a technology preview in Red Hat Enterprise Linux version 4.6. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 67062 published 2013-06-29 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67062 title CentOS 4 : autofs5 (CESA-2007:1129) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2007-1177.NASL description Updated autofs5 technology preview packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. The autofs5 packages were made available as a technology preview in Red Hat Enterprise Linux 4.6. There was a security issue with the default configuration of autofs version 5, whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 29754 published 2007-12-24 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/29754 title CentOS 4 : autofs5 (CESA-2007:1177) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2007-1128.NASL description From Red Hat Security Advisory 2007:1128 : Updated autofs packages are now available to fix a security flaw for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts and unmounts file systems after a period of inactivity. There was a security issue with the default installed configuration of autofs version 5 whereby the entry for the last seen 2020-06-01 modified 2020-06-02 plugin id 67621 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67621 title Oracle Linux 5 : autofs (ELSA-2007-1128)
Oval
accepted | 2013-04-29T04:02:24.924-04:00 | ||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||
description | The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the nosuid option for the hosts (/net filesystem) map, which allows local users to gain privileges via a setuid program on a remote NFS server. | ||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||
id | oval:org.mitre.oval:def:10158 | ||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||||||
title | The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the nosuid option for the hosts (/net filesystem) map, which allows local users to gain privileges via a setuid program on a remote NFS server. | ||||||||||||||||||||||||
version | 28 |
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://osvdb.org/40441
- http://osvdb.org/40441
- http://secunia.com/advisories/28052
- http://secunia.com/advisories/28052
- http://secunia.com/advisories/28097
- http://secunia.com/advisories/28097
- http://secunia.com/advisories/28456
- http://secunia.com/advisories/28456
- http://securitytracker.com/id?1019087
- http://securitytracker.com/id?1019087
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:009
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:009
- http://www.redhat.com/support/errata/RHSA-2007-1128.html
- http://www.redhat.com/support/errata/RHSA-2007-1128.html
- http://www.redhat.com/support/errata/RHSA-2007-1129.html
- http://www.redhat.com/support/errata/RHSA-2007-1129.html
- http://www.securityfocus.com/bid/26841
- http://www.securityfocus.com/bid/26841
- https://bugzilla.redhat.com/show_bug.cgi?id=409701
- https://bugzilla.redhat.com/show_bug.cgi?id=409701
- https://bugzilla.redhat.com/show_bug.cgi?id=410031
- https://bugzilla.redhat.com/show_bug.cgi?id=410031
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10158
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10158
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00474.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00474.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00549.html
- https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00549.html