Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-12561

Опубликовано: 19 июн. 2018
Источник: debian

Описание

An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. A regular user can inject additional mount options such as file_mode= by manipulating (for example) the domain parameter of the samba URL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cantatafixed2.3.0.ds1-2package

Примечания

  • https://www.openwall.com/lists/oss-security/2018/06/18/1

  • The daemon code is part of cantata since version 2.0.0 and it is built

  • by default in versions 2.3.0 and 2.3.1. Before 2.3.0 it was only built

  • if `-DENABLE_REMOTE_DEVICES=ON` was passed to the cmake invocation.

  • 2.3.0.ds1-2 disables the cantata-mounter.

  • https://github.com/CDrummond/cantata/commit/afc4f8315d3e96574925fb530a7004cc9e6ce3d3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. A regular user can inject additional mount options such as file_mode= by manipulating (for example) the domain parameter of the samba URL.

CVSS3: 8.8
nvd
больше 7 лет назад

An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. A regular user can inject additional mount options such as file_mode= by manipulating (for example) the domain parameter of the samba URL.

CVSS3: 8.8
github
больше 3 лет назад

An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. A regular user can inject additional mount options such as file_mode= by manipulating (for example) the domain parameter of the samba URL.