Vulnerabilities > CVE-2007-6285 - Configuration vulnerability in Redhat Enterprise Linux 4.0/5.0

047910
CVSS 6.2 - MEDIUM
Attack vector
LOCAL
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
local
high complexity
redhat
CWE-16
nessus

Summary

The default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 4 and 5, does not specify the nodev mount option for the -hosts map, which allows local users to access "important devices" by operating a remote NFS server and creating special device files on that server, as demonstrated by the /dev/mem device.

Vulnerable Configurations

Part Description Count
OS
Redhat
2

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-4707.NASL
    description - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> - 5.0.2-24 - Bug 426400: CVE-2007-6285 autofs default doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id29767
    published2007-12-24
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29767
    titleFedora 8 : autofs-5.0.2-24 (2007-4707)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2007-4707.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(29767);
      script_version ("1.15");
      script_cvs_date("Date: 2019/08/02 13:32:26");
    
      script_cve_id("CVE-2007-6285");
      script_bugtraq_id(26970);
      script_xref(name:"FEDORA", value:"2007-4707");
    
      script_name(english:"Fedora 8 : autofs-5.0.2-24 (2007-4707)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> -
        5.0.2-24
    
        - Bug 426400: CVE-2007-6285 autofs default doesn't set
          nodev in /net [f8]
    
        - use mount option 'nodev' for '-hosts' map unless 'dev'
          is explicily specified.
    
        - Tue Dec 18 2007 Ian Kent <ikent at redhat.com> -
          5.0.2-22
    
        - Bug 397591 SELinux is preventing /sbin/rpc.statd
          (rpcd_t) 'search' to <Unknown> (sysctl_fs_t).
    
        - prevent fork between fd open and setting of
          FD_CLOEXEC.
    
        - Thu Dec 13 2007 Ian Kent <ikent at redhat.com> -
          5.0.2-20
    
        - Bug 409701: CVE-2007-5964 Privilege Escalation (from
          local system) through /net autofs mount configuration
          bug
    
        - use mount option 'nosuid' for '-hosts' map unless
          'suid' is explicily specified.
    
        - Tue Nov 20 2007 Ian Kent <ikent at redhat.com> -
          5.0.2-17
    
        - fix schema selection in LDAP schema discovery.
    
        - check for '*' when looking up wildcard in LDAP.
    
        - fix couple of edge case parse fails of timeout option.
    
        - add SEARCH_BASE configuration option.
    
        - add random selection as a master map entry option.
    
        - re-read config on HUP signal.
    
        - add LDAP_URI, LDAP_TIMEOUT and LDAP_NETWORK_TIMEOUT
          configuration options.
    
        - fix deadlock in submount mount module.
    
        - fix lack of ferror() checking when reading files.
    
        - fix typo in autofs(5) man page.
    
        - fix map entry expansion when undefined macro is
          present.
    
        - remove unused export validation code.
    
        - add dynamic logging (adapted from v4 patch from Jeff
          Moyer).
    
        - fix recursive loopback mounts (Matthias Koenig).
    
        - add map re-load to verbose logging.
    
        - fix handling of LDAP base dns with spaces.
    
        - handle MTAB_NOTUPDATED status return from mount.
    
        - when default master map, auto.master, is used also
          check for auto_master.
    
        - update negative mount timeout handling.
    
        - fix large group handling (Ryan Thomas).
    
        - fix for dynamic logging breaking non-sasl build
          (Guillaume Rousse).
    
        - eliminate NULL proc ping for singleton host or local
          mounts.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2007-December/006188.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?4b431d1d"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected autofs and / or autofs-debuginfo packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(16);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:8");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2007/12/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/24");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^8([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 8.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC8", reference:"autofs-5.0.2-24")) flag++;
    if (rpm_check(release:"FC8", reference:"autofs-debuginfo-5.0.2-24")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs / autofs-debuginfo");
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-4709.NASL
    description - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> - 5.0.1-31 - Bug 426399: CVE-2007-6285 autofs default doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id29768
    published2007-12-24
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29768
    titleFedora 7 : autofs-5.0.1-31 (2007-4709)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2007-4709.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(29768);
      script_version ("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:26");
    
      script_cve_id("CVE-2007-6285");
      script_bugtraq_id(26970);
      script_xref(name:"FEDORA", value:"2007-4709");
    
      script_name(english:"Fedora 7 : autofs-5.0.1-31 (2007-4709)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "  - Fri Dec 21 2007 Ian Kent <ikent at redhat.com> -
        5.0.1-31
    
        - Bug 426399: CVE-2007-6285 autofs default doesn't set
          nodev in /net [f7]
    
        - use mount option 'nodev' for '-hosts' map unless 'dev'
          is explicily specified.
    
        - Tue Dec 18 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-30
    
        - Bug 397591 SELinux is preventing /sbin/rpc.statd
          (rpcd_t) 'search' to <Unknown> (sysctl_fs_t).
    
        - prevent fork between fd open and setting of
          FD_CLOEXEC.
    
        - Thu Dec 13 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-29
    
        - Bug 421351: CVE-2007-5964 autofs defaults don't
          restrict suid in /net [f7]
    
        - use mount option 'nosuid' for '-hosts' map unless
          'suid' is explicily specified.
    
        - Wed Sep 5 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-28
    
        - add ldaps support (required by schema discovery).
    
        - add back LDAP schema discovery if no schema is
          configured.
    
        - Tue Aug 28 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-26
    
        - fix 'nosymlink' option handling and add desription to
          man page.
    
        - update patch to prevent failure on empty master map.
    
        - if there's no 'automount' entry in nsswitch.conf use
          'files' source.
    
        - add LDAP schema discovery if no schema is configured.
    
        - Tue Aug 21 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-25
    
        - change random multiple server selection option name to
          be consistent with upstream naming.
    
      - Tue Aug 21 2007 Ian Kent <ikent at redhat.com> -
        5.0.1-24
    
        - don't fail on empty master map.
    
        - allow for older schemas that allow '*' as a key value.
    
        - add support for the '%' hack for case insensitive
          attribute schemas.
    
        - Mon Jul 30 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-23
    
        - mark map instances stale so they aren't 'cleaned'
          during updates.
    
        - fix large file compile time option.
    
        - Fri Jul 27 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-22
    
        - fix version passed to get_supported_ver_and_cost (bz
          249574).
    
        - Tue Jul 24 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-21
    
        - fix parse confusion between attribute and attribute
          value.
    
        - Fri Jul 20 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-20
    
        - fix handling of quoted slash alone (bz 248943).
    
        - Wed Jul 18 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-19
    
        - fix wait time resolution in alarm and state queue
          handlers (bz 247711).
    
        - Mon Jul 16 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-18
    
        - correct man page of patch which added mount options
          append control.
    
        - Mon Jul 16 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-17
    
        - fix mount point directory creation for bind mounts.
    
        - add quoting for exports gathered by hosts map.
    
        - Thu Jun 7 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-13
    
        - fix deadlock in alarm manager module.
    
        - Sun Jun 3 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-11
    
        - correct mistake in logic test in wildcard lookup.
    
        - Mon May 7 2007 Ian Kent <ikent at redhat.com> -
          5.0.1-10
    
        - fix master map lexer to admit '.' in macro values.
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.redhat.com/show_bug.cgi?id=426399"
      );
      # https://lists.fedoraproject.org/pipermail/package-announce/2007-December/006194.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?cd21c796"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected autofs and / or autofs-debuginfo packages."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(16);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:autofs-debuginfo");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:7");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/12/21");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/24");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 7.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC7", reference:"autofs-5.0.1-31")) flag++;
    if (rpm_check(release:"FC7", reference:"autofs-debuginfo-5.0.1-31")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs / autofs-debuginfo");
    }
    
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2007-1177.NASL
    descriptionFrom Red Hat Security Advisory 2007:1177 : Updated autofs5 technology preview packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. The autofs5 packages were made available as a technology preview in Red Hat Enterprise Linux 4.6. There was a security issue with the default configuration of autofs version 5, whereby the entry for the
    last seen2020-06-01
    modified2020-06-02
    plugin id67628
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67628
    titleOracle Linux 4 : autofs5 (ELSA-2007-1177)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Red Hat Security Advisory RHSA-2007:1177 and 
    # Oracle Linux Security Advisory ELSA-2007-1177 respectively.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(67628);
      script_version("1.8");
      script_cvs_date("Date: 2019/10/25 13:36:07");
    
      script_cve_id("CVE-2007-6285");
      script_bugtraq_id(26970);
      script_xref(name:"RHSA", value:"2007:1177");
    
      script_name(english:"Oracle Linux 4 : autofs5 (ELSA-2007-1177)");
      script_summary(english:"Checks rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Oracle Linux host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "From Red Hat Security Advisory 2007:1177 :
    
    Updated autofs5 technology preview packages that fix a security issue
    are now available for Red Hat Enterprise Linux 4.
    
    This update has been rated as having important security impact by the
    Red Hat Security Response Team.
    
    The autofs utility controls the operation of the automount daemon,
    which automatically mounts file systems when you use them, and
    unmounts them when you are not using them. This can include network
    file systems and CD-ROMs. The autofs5 packages were made available as
    a technology preview in Red Hat Enterprise Linux 4.6.
    
    There was a security issue with the default configuration of autofs
    version 5, whereby the entry for the '-hosts' map did not specify the
    'nodev' mount option. A local user with control of a remote NFS server
    could create special device files on the remote file system, that if
    mounted using the default '-hosts' map, could allow the user to access
    important system devices. (CVE-2007-6285)
    
    This issue is similar to CVE-2007-5964, which fixed a missing 'nosuid'
    mount option in autofs. Both the 'nodev' and 'nosuid' options should
    be enabled to prevent a possible compromise of machine integrity.
    
    Due to the fact that autofs always mounted '-hosts' map entries 'dev'
    by default, autofs has now been altered to always use the 'nodev'
    option when mounting from the default '-hosts' map. The 'dev' option
    must be explicitly given in the master map entry to revert to the old
    behavior. This change affects only the '-hosts' map which corresponds
    to the '/net' entry in the default configuration.
    
    All autofs5 users are advised to upgrade to these updated packages,
    which resolve this issue.
    
    Red Hat would like to thank Tim Baum for reporting this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://oss.oracle.com/pipermail/el-errata/2007-December/000461.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected autofs5 package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(16);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:autofs5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:4");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/12/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Oracle Linux Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
    os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
    os_ver = os_ver[1];
    if (! preg(pattern:"^4([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 4", "Oracle Linux " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
    
    flag = 0;
    if (rpm_check(release:"EL4", cpu:"i386", reference:"autofs5-5.0.1-0.rc2.55.el4_6.2")) flag++;
    if (rpm_check(release:"EL4", cpu:"x86_64", reference:"autofs5-5.0.1-0.rc2.55.el4_6.2")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
      else security_warning(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs5");
    }
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-1176.NASL
    descriptionUpdated autofs packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. There was a security issue with the default configuration of autofs version 5, whereby the entry for the
    last seen2020-06-01
    modified2020-06-02
    plugin id29777
    published2007-12-24
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29777
    titleRHEL 5 : autofs (RHSA-2007:1176)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Red Hat Security Advisory RHSA-2007:1176. The text 
    # itself is copyright (C) Red Hat, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(29777);
      script_version ("1.23");
      script_cvs_date("Date: 2019/10/25 13:36:13");
    
      script_cve_id("CVE-2007-6285");
      script_bugtraq_id(26970);
      script_xref(name:"RHSA", value:"2007:1176");
    
      script_name(english:"RHEL 5 : autofs (RHSA-2007:1176)");
      script_summary(english:"Checks the rpm output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Red Hat host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Updated autofs packages that fix a security issue are now available
    for Red Hat Enterprise Linux 5.
    
    This update has been rated as having important security impact by the
    Red Hat Security Response Team.
    
    The autofs utility controls the operation of the automount daemon,
    which automatically mounts file systems when you use them, and
    unmounts them when you are not using them. This can include network
    file systems and CD-ROMs.
    
    There was a security issue with the default configuration of autofs
    version 5, whereby the entry for the '-hosts' map did not specify the
    'nodev' mount option. A local user with control of a remote NFS server
    could create special device files on the remote file system, that if
    mounted using the default '-hosts' map, could allow the user to access
    important system devices. (CVE-2007-6285)
    
    This issue is similar to CVE-2007-5964, which fixed a missing 'nosuid'
    mount option in autofs. Both the 'nodev' and 'nosuid' options should
    be enabled to prevent a possible compromise of machine integrity.
    
    Due to the fact that autofs always mounted '-hosts' map entries 'dev'
    by default, autofs has now been altered to always use the 'nodev'
    option when mounting from the default '-hosts' map. The 'dev' option
    must be explicitly given in the master map entry to revert to the old
    behavior. This change affects only the '-hosts' map which corresponds
    to the '/net' entry in the default configuration.
    
    All autofs users are advised to upgrade to these updated packages,
    which resolve this issue.
    
    Red Hat would like to thank Tim Baum for reporting this issue."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/security/cve/cve-2007-6285"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://access.redhat.com/errata/RHSA-2007:1176"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Update the affected autofs package."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(16);
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:autofs");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.1");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/12/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/12/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/12/24");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Red Hat Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
    os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
    os_ver = os_ver[1];
    if (! preg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x", "Red Hat " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
    
    yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
    if (!empty_or_null(yum_updateinfo)) 
    {
      rhsa = "RHSA-2007:1176";
      yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
      if (!empty_or_null(yum_report))
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : yum_report 
        );
        exit(0);
      }
      else
      {
        audit_message = "affected by Red Hat security advisory " + rhsa;
        audit(AUDIT_OS_NOT, audit_message);
      }
    }
    else
    {
      flag = 0;
      if (rpm_check(release:"RHEL5", cpu:"i386", reference:"autofs-5.0.1-0.rc2.55.el5.2")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"autofs-5.0.1-0.rc2.55.el5.2")) flag++;
    
      if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"autofs-5.0.1-0.rc2.55.el5.2")) flag++;
    
    
      if (flag)
      {
        security_report_v4(
          port       : 0,
          severity   : SECURITY_WARNING,
          extra      : rpm_report_get() + redhat_report_package_caveat()
        );
        exit(0);
      }
      else
      {
        tested = pkg_tests_get();
        if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
        else audit(AUDIT_PACKAGE_NOT_INSTALLED, "autofs");
      }
    }
    
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-1176.NASL
    descriptionUpdated autofs packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. There was a security issue with the default configuration of autofs version 5, whereby the entry for the
    last seen2020-06-01
    modified2020-06-02
    plugin id43665
    published2010-01-06
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43665
    titleCentOS 5 : autofs (CESA-2007:1176)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2008-009.NASL
    descriptionThe default behaviour of autofs 5 for the hosts map did not specify the nosuid and nodev mount options. This could allow a local user with control of a remote NFS server to create a setuid root executable on the exported filesystem of the remote NFS server. If this filesystem was mounted with the default hosts map, it would allow the user to obtain root privileges (CVE-2007-5964). Likewise, the same scenario would be available for local users able to create device files on the exported filesystem which could allow the user to gain access to important system devices (CVE-2007-6285). Because the default behaviour of autofs was to mount -hosts map entries with the dev and suid options enabled by default, autofs has been altered to always use nodev and nosuid by default. In order to have the old behaviour, the configuration must now explicitly set the dev and/or suid options. This change only affects the -hosts map which corresponds to the /net entry in the default configuration. Update : The previous update shipped with an incorrect LDAP lookup module that would prevent the automount daemon from starting. This update corrects that problem.
    last seen2020-06-01
    modified2020-06-02
    plugin id37526
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/37526
    titleMandriva Linux Security Advisory : autofs (MDVSA-2008:009-1)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2007-1177.NASL
    descriptionUpdated autofs5 technology preview packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. The autofs5 packages were made available as a technology preview in Red Hat Enterprise Linux 4.6. There was a security issue with the default configuration of autofs version 5, whereby the entry for the
    last seen2020-06-01
    modified2020-06-02
    plugin id29778
    published2007-12-24
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29778
    titleRHEL 4 : autofs5 (RHSA-2007:1177)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2007-1176.NASL
    descriptionFrom Red Hat Security Advisory 2007:1176 : Updated autofs packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. There was a security issue with the default configuration of autofs version 5, whereby the entry for the
    last seen2020-06-01
    modified2020-06-02
    plugin id67627
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/67627
    titleOracle Linux 5 : autofs (ELSA-2007-1176)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2007-1177.NASL
    descriptionUpdated autofs5 technology preview packages that fix a security issue are now available for Red Hat Enterprise Linux 4. This update has been rated as having important security impact by the Red Hat Security Response Team. The autofs utility controls the operation of the automount daemon, which automatically mounts file systems when you use them, and unmounts them when you are not using them. This can include network file systems and CD-ROMs. The autofs5 packages were made available as a technology preview in Red Hat Enterprise Linux 4.6. There was a security issue with the default configuration of autofs version 5, whereby the entry for the
    last seen2020-06-01
    modified2020-06-02
    plugin id29754
    published2007-12-24
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29754
    titleCentOS 4 : autofs5 (CESA-2007:1177)

Oval

accepted2013-04-29T04:14:11.685-04:00
classvulnerability
contributors
  • nameAharon Chernin
    organizationSCAP.com, LLC
  • nameDragos Prisaca
    organizationG2, Inc.
definition_extensions
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 4
    ovaloval:org.mitre.oval:def:11831
  • commentCentOS Linux 4.x
    ovaloval:org.mitre.oval:def:16636
  • commentOracle Linux 4.x
    ovaloval:org.mitre.oval:def:15990
  • commentThe operating system installed on the system is Red Hat Enterprise Linux 5
    ovaloval:org.mitre.oval:def:11414
  • commentThe operating system installed on the system is CentOS Linux 5.x
    ovaloval:org.mitre.oval:def:15802
  • commentOracle Linux 5.x
    ovaloval:org.mitre.oval:def:15459
descriptionThe default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 4 and 5, does not specify the nodev mount option for the -hosts map, which allows local users to access "important devices" by operating a remote NFS server and creating special device files on that server, as demonstrated by the /dev/mem device.
familyunix
idoval:org.mitre.oval:def:11457
statusaccepted
submitted2010-07-09T03:56:16-04:00
titleThe default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 4 and 5, does not specify the nodev mount option for the -hosts map, which allows local users to access "important devices" by operating a remote NFS server and creating special device files on that server, as demonstrated by the /dev/mem device.
version28

Redhat

advisories
  • bugzilla
    id426218
    titleCVE-2007-6285 autofs default doesn't set nodev in /net
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • commentautofs is earlier than 1:5.0.1-0.rc2.55.el5.2
        ovaloval:com.redhat.rhsa:tst:20071176001
      • commentautofs is signed with Red Hat redhatrelease key
        ovaloval:com.redhat.rhsa:tst:20071128002
    rhsa
    idRHSA-2007:1176
    released2007-12-20
    severityImportant
    titleRHSA-2007:1176: autofs security update (Important)
  • bugzilla
    id426218
    titleCVE-2007-6285 autofs default doesn't set nodev in /net
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • commentautofs5 is earlier than 1:5.0.1-0.rc2.55.el4_6.2
        ovaloval:com.redhat.rhsa:tst:20071177001
      • commentautofs5 is signed with Red Hat master key
        ovaloval:com.redhat.rhsa:tst:20071129002
    rhsa
    idRHSA-2007:1177
    released2007-12-20
    severityImportant
    titleRHSA-2007:1177: autofs5 security update (Important)
rpms
  • autofs-1:5.0.1-0.rc2.55.el5.2
  • autofs-debuginfo-1:5.0.1-0.rc2.55.el5.2
  • autofs5-1:5.0.1-0.rc2.55.el4_6.2
  • autofs5-debuginfo-1:5.0.1-0.rc2.55.el4_6.2