Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce: ncpfs, privilege elevation via ncpmount and ncpumount

February 2010 by Vigil@nce

SYNTHESIS OF THE VULNERABILITY

When the ncpmount and ncpumount tools are installed suid root, a
local attacker can use a symbolic link, in order to elevate his
privileges, to obtain information or to create a denial of service.

Severity: 2/4

Consequences: administrator access/rights, privileged
access/rights, user access/rights, data reading, denial of service
of service, denial of service of client

Provenance: user shell

Means of attack: 1 attack

Ability of attacker: technician (2/4)

Confidence: confirmed by the editor (5/5)

Diffusion of the vulnerable configuration: high (3/3)

Creation date: 29/01/2010

IMPACTED PRODUCTS

 Unix - plateform

DESCRIPTION OF THE VULNERABILITY

The ncpmount and ncpumount utilities are used to mount a remote
NCP (NetWare Core Protocol) share in a local directory. These
tools are frequently installed suid root.

However, the ncpmount tool does not atomically check the mount
directory. A local attacker can therefore:
 call ncpmount to mount a remote share on /home/user/mydir
 during its execution, replace /home/user/mydir by a symbolic link to /privatedirectory
 wait for ncpmount to mount the share on /privatedirectory
So, by modifying/reading the content of the share on the remote
server, the local attacker can modify/read to content of
/privatedirectory.

Moreover, the ncpumount tool does not atomically check the
directory to be unmounted. A local attacker can therefore:
 call "ncpumount /home/user/mydir"
 during its execution, replace /home/user/mydir by a symbolic
link to /privatedirectory
 wait for ncpumount to unmount /privatedirectory

A local attacker can thus unmount a mount point belonging to
another user.

When the ncpmount and ncpumount tools are installed suid root, a
local attacker can therefore use a symbolic link, in order to
elevate his privileges, to obtain information or to create a
denial of service.

CHARACTERISTICS

Identifiers: 532940, CVE-2009-3297, VIGILANCE-VUL-9392

http://vigilance.fr/vulnerability/ncpfs-privilege-elevation-via-ncpmount-and-ncpumount-9392


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts