Vulnerability identifier: #VU32675
Vulnerability risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2013-0157
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Util-linux
Universal components / Libraries /
Libraries used by multiple products
Vendor: kernel.org
Description
The vulnerability allows a local non-authenticated attacker to gain access to sensitive information.
(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Util-linux: 4.31
External links
https://bugs.debian.org/697464
https://marc.info/?l=oss-security&m=135749410312247&w=2
https://osvdb.org/88953
https://rhn.redhat.com/errata/RHSA-2013-0517.html
https://www.mandriva.com/security/advisories?name=MDVSA-2013:154
https://bugzilla.redhat.com/show_bug.cgi?id=892330
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.