Vulnerability identifier: #VU94166
Vulnerability risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to execute arbitrary code.
The DNS resolution functionality in the CIFS implementation in the Linux kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled, relies on a user's keyring for the dns_resolver upcall in the cifs.upcall userspace helper, which allows local users to spoof the results of DNS queries and perform arbitrary CIFS mounts via vectors involving an add_key call, related to a 'cache stuffing' issue and MS-DFS referrals.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Linux kernel: All versions
External links
https://marc.info/?l=oss-security&m=128080755321157&w=2
https://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
https://marc.info/?l=oss-security&m=128078387328921&w=2
https://bugzilla.redhat.com/show_bug.cgi?id=612166
https://marc.info/?l=oss-security&m=128072090331700&w=2
https://www.redhat.com/support/errata/RHSA-2010-0610.html
https://www.mandriva.com/security/advisories?name=MDVSA-2010:172
https://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
https://www.ubuntu.com/usn/USN-1000-1
https://www.vmware.com/security/advisories/VMSA-2011-0003.html
https://secunia.com/advisories/43315
https://www.securityfocus.com/archive/1/516397/100/0/threaded
https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.