Описание
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
A stack-based buffer overflow issue was found in cifs-utils. Parsing the mount.cifs ip command-line argument can lead to local attackers gaining root privileges.
Отчет
The mount.cifs binary file is shipped without setuid privileges as default which prevents an attacker to gain root privileges hence lowering the flaw impact.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | cifs-utils | Out of support scope | ||
| Red Hat Enterprise Linux 7 | cifs-utils | Will not fix | ||
| Red Hat Enterprise Linux 9 | cifs-utils | Will not fix | ||
| Red Hat Enterprise Linux 8 | cifs-utils | Fixed | RHBA-2023:3052 | 16.05.2023 |
Показывать по
Дополнительная информация
Статус:
EPSS
7 High
CVSS3
Связанные уязвимости
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
In cifs-utils through 6.14, a stack-based buffer overflow when parsing ...
EPSS
7 High
CVSS3