Improper Input Validation Affecting cifs-utils package, versions <2:5.1-1


Severity

Recommended
0.0
low
0
10

Based on Debian security rating

    Threat Intelligence

    EPSS
    0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-DEBIAN10-CIFSUTILS-315105
  • published 6 Sep 2011
  • disclosed 6 Sep 2011

How to fix?

Upgrade Debian:10 cifs-utils to version 2:5.1-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cifs-utils package and not the cifs-utils package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547.

CVSS Scores

version 3.1
Expand this section

NVD

2.9 low
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    None
  • Availability (A)
    Low
Expand this section

Red Hat

4 medium