ncpfs 2.2.6 allows local users to cause a denial of service, obtain sensitive information, or possibly gain privileges via symlink attacks involving the (1) ncpmount and (2) ncpumount programs.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://secunia.com/advisories/38371 | third party advisory vendor advisory |
http://seclists.org/fulldisclosure/2010/Mar/122 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=558833 | |
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034422.html | vendor advisory |
http://secunia.com/advisories/38327 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/509893/100/0/threaded | mailing list |
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034403.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=532940 | |
http://www.securityfocus.com/bid/38563 | vdb entry |
http://www.securityfocus.com/archive/1/509894/100/0/threaded | mailing list |