7.2
CVSSv2

CVE-2005-2876

Published: 13/09/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

umount in util-linux 2.8 to 2.12q, 2.13-pre1, and 2.13-pre2, and other packages such as loop-aes-utils, allows local users with unmount permissions to gain privileges via the -r (remount) option, which causes the file system to be remounted with just the read-only flag, which effectively clears the nosuid, nodev, and other flags.

Vulnerable Product Search on Vulmon Subscribe to Product

andries brouwer util-linux 2.11f

andries brouwer util-linux 2.11n

andries brouwer util-linux 2.11q

andries brouwer util-linux 2.12b

andries brouwer util-linux 2.12i

andries brouwer util-linux 2.13_pre2

andries brouwer util-linux 2.8.1_alpha

andries brouwer util-linux 2.10f

andries brouwer util-linux 2.11x

andries brouwer util-linux 2.11y

andries brouwer util-linux 2.12o

andries brouwer util-linux 2.12p

andries brouwer util-linux 2.9w

andries brouwer util-linux 2.11r

andries brouwer util-linux 2.11w

andries brouwer util-linux 2.12j

andries brouwer util-linux 2.12k

andries brouwer util-linux 2.8_12

andries brouwer util-linux 2.9i

andries brouwer util-linux 2.10m

andries brouwer util-linux 2.10p

andries brouwer util-linux 2.11z

andries brouwer util-linux 2.12a

andries brouwer util-linux 2.12q

andries brouwer util-linux 2.13_pre1

Vendor Advisories

Synopsis util-linux and mount security update Type/Severity Security Advisory: Moderate Topic Updated util-linux and mount packages that fix two security issues are nowavailableThis update has been rated as having moderate security impact by the RedHat Security Response Team Description T ...
David Watson discovered that “umount -r” removed some restrictive mount options like the “nosuid” flag If /etc/fstab contains user-mountable removable devices which specify the “nosuid” flag (which is common practice for such devices), a local attacker could exploit this to execute arbitrary programs with root privileges by calling “ ...
David Watson discovered a bug in mount as provided by util-linux and other packages such as loop-aes-utils that allows local users to bypass filesystem access restrictions by re-mounting it read-only For the old stable distribution (woody) this problem has been fixed in version 211n-7woody1 For the stable distribution (sarge) this problem has be ...