7.2
CVSSv2

CVE-2010-0296

Published: 01/06/2010 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and previous versions, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu glibc 2.2.2

gnu glibc 2.9

gnu glibc 2.7

gnu glibc 2.1.2

gnu glibc 2.11

gnu glibc 2.0.5

gnu glibc 2.2.5

gnu glibc 2.0.6

gnu glibc 2.10.1

gnu glibc 2.1.1

gnu glibc 2.0.3

gnu glibc 2.3.1

gnu glibc 2.3

gnu glibc 2.0

gnu glibc 2.1.1.6

gnu glibc 2.3.10

gnu glibc 2.4

gnu glibc 2.1

gnu glibc 2.3.4

gnu glibc 2.1.9

gnu glibc 2.3.3

gnu glibc 2.6.1

gnu glibc 2.0.1

gnu glibc 2.10

gnu glibc 2.5.1

gnu glibc 2.6

gnu glibc 2.0.4

gnu glibc 2.0.2

gnu glibc 2.2.1

gnu glibc 2.3.2

gnu glibc

gnu glibc 2.3.6

gnu glibc 2.2.3

gnu glibc 2.5

gnu glibc 2.3.5

gnu glibc 2.8

gnu glibc 2.2.4

gnu glibc 2.1.3

gnu glibc 2.2

Vendor Advisories

Synopsis Moderate: glibc security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated glibc packages that fix multiple security issues and one bug arenow available for Red Hat Enterprise Linux 4The Red Hat Security Response Team has rated this update as having moderatesecurity impact ...
Debian Bug report logs - #583908 CVE-2010-0296: GNU Glibc mntent Newline Processing Error Lets Local Users Gain Elevated Privileges Package: libc6; Maintainer for libc6 is GNU Libc Maintainers <debian-glibc@listsdebianorg>; Source for libc6 is src:glibc (PTS, buildd, popcon) Reported by: Bernd Zeimetz <bzed@debianorg&g ...
The GNU C library did not correctly handle certain mnt entries, strfmon arguments, and ELF program headers ...

Exploits

The industrial managed switch series 852 from WAGO is affected by multiple vulnerabilities such as old software components embedded in the firmware Furthermore, hardcoded password hashes and credentials were also found by doing an automated scan with IoT Inspector ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series <!--X-Subject-Heade ...