2024-07-14 02:06:08 +00:00

80 lines
3.1 KiB
JSON

{
"id": "CVE-2007-0004",
"sourceIdentifier": "secalert@redhat.com",
"published": "2007-09-18T19:17:00.000",
"lastModified": "2008-09-05T21:16:46.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NFS client implementation in the kernel in Red Hat Enterprise Linux (RHEL) 3, when a filesystem is mounted with the noacl option, checks permissions for the open system call via vfs_permission (mode bits) data rather than an NFS ACCESS call to the server, which allows local client processes to obtain a false success status from open calls that the server would deny, and possibly obtain sensitive information about file permissions on the server, as demonstrated in a root_squash environment. NOTE: it is uncertain whether any scenarios involving this issue cross privilege boundaries."
},
{
"lang": "es",
"value": "La implementaci\u00f3n del cliente NFS en el n\u00facleo de Red Hat Enterprise Linux (RHEL) 3, cuando un sistema de ficheros se monta con la opci\u00f3n noacl, comprueba los permisos para la llamada al sistema open mediante la informaci\u00f3n vfs_permission (bits de modo o mode bits) en lugar de una llamada NFS ACCESS al servidor, lo cual permite a procesos cliente locales obtener un falso estado de \u00e9xito de llamadas a open que el servidor denegar\u00eda, y posiblemente obtener informaci\u00f3n sensible sobre los permisos de fichero en el servidor, como se ha demostrado en un entorno root_squash. NOTA: no est\u00e1 claro si cualquier escenario involucrando este problema cruzan los l\u00edmites de la seguridad."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "40D8DAE0-8E75-435C-9BD6-FAEED2ACB47C"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=199715",
"source": "secalert@redhat.com"
}
]
}