Incorrect Default Permissions Affecting nfs-utils package, versions <1:1.3.4-2.5+deb10u1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
1.03% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Default Permissions vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN10-NFSUTILS-467295
  • published19 Sept 2019
  • disclosed19 Sept 2019

Introduced: 19 Sep 2019

CVE-2019-3689  (opens in a new tab)
CWE-276  (opens in a new tab)

How to fix?

Upgrade Debian:10 nfs-utils to version 1:1.3.4-2.5+deb10u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nfs-utils package and not the nfs-utils package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

The nfs-utils package in SUSE Linux Enterprise Server 12 before and including version 1.3.0-34.18.1 and in SUSE Linux Enterprise Server 15 before and including version 2.1.1-6.10.2 the directory /var/lib/nfs is owned by statd:nogroup. This directory contains files owned and managed by root. If statd is compromised, it can therefore trick processes running with root privileges into creating/overwriting files anywhere on the system.

CVSS Scores

version 3.1