Vulnerability CVE-2008-3970


Published: 2008-09-10   Modified: 2012-02-12

Description:
pam_mount 0.10 through 0.45, when luserconf is enabled, does not verify mountpoint and source ownership before mounting a user-defined volume, which allows local users to bypass intended access restrictions via a local mount.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.9/10
10/10
3.4/10
Exploit range
Attack complexity
Authentication
Local
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Pam mount -> Pam mount 

 References:
http://xforce.iss.net/xforce/xfdb/44960
http://www.securityfocus.com/bid/31041
http://www.openwall.com/lists/oss-security/2008/09/09/12
http://www.openwall.com/lists/oss-security/2008/09/06/3
http://www.mandriva.com/security/advisories?name=MDVSA-2008:208
http://sourceforge.net/project/shownotes.php?release_id=624240
http://sourceforge.net/mailarchive/forum.php?thread_name=alpine.LNX.1.10.0809042353120.17569%40fbirervta.pbzchgretzou.qr&forum_name=pam-mount-user
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
http://dev.medozas.de/gitweb.cgi?p=pam_mount;a=commitdiff;h=33b91d7659ae3aa78b1e94fd3f8e545ae5ff25db

Copyright 2024, cxsecurity.com

 

Back to Top