MEDIUM
The DNS resolution functionality in the CIFS implementation in the Linux kernel before 2.6.35, when CONFIG_CIFS_DFS_UPCALL is enabled, relies on a user's keyring for the dns_resolver upcall in the cifs.upcall userspace helper, which allows local users to spoof the results of DNS queries and perform arbitrary CIFS mounts via vectors involving an add_key call, related to a "cache stuffing" issue and MS-DFS referrals.
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00004.html
http://marc.info/?l=oss-security&m=128072090331700&w=2
http://marc.info/?l=oss-security&m=128078387328921&w=2
http://marc.info/?l=oss-security&m=128080755321157&w=2
http://secunia.com/advisories/43315
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35
http://www.mandriva.com/security/advisories?name=MDVSA-2010:172
http://www.redhat.com/support/errata/RHSA-2010-0610.html
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.ubuntu.com/usn/USN-1000-1
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
Source: MITRE
Published: 2010-09-08
Updated: 2020-08-14
Type: NVD-CWE-noinfo
Base Score: 4.6
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 3.9
Severity: MEDIUM
Base Score: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1.8
Severity: HIGH