Vulnerability identifier: #VU33118
Vulnerability risk: Low
CVSSv4.0: 2 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local
Exploit availability: Yes
Description
The vulnerability allows a local non-authenticated attacker to gain access to sensitive information.
mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
Mitigation
Install update from vendor's website.
External links
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665923
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00024.html
https://www.openwall.com/lists/oss-security/2012/03/27/1
https://www.openwall.com/lists/oss-security/2012/03/27/6
https://bugzilla.samba.org/show_bug.cgi?id=8821
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.