CVE-2011-1089

LOW
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.

References

http://openwall.com/lists/oss-security/2011/03/04/10

http://openwall.com/lists/oss-security/2011/03/04/11

http://openwall.com/lists/oss-security/2011/03/04/12

http://openwall.com/lists/oss-security/2011/03/04/9

http://openwall.com/lists/oss-security/2011/03/05/3

http://openwall.com/lists/oss-security/2011/03/05/7

http://openwall.com/lists/oss-security/2011/03/07/9

http://openwall.com/lists/oss-security/2011/03/14/16

http://openwall.com/lists/oss-security/2011/03/14/5

http://openwall.com/lists/oss-security/2011/03/14/7

http://openwall.com/lists/oss-security/2011/03/15/6

http://openwall.com/lists/oss-security/2011/03/22/4

http://openwall.com/lists/oss-security/2011/03/22/6

http://openwall.com/lists/oss-security/2011/03/31/3

http://openwall.com/lists/oss-security/2011/03/31/4

http://openwall.com/lists/oss-security/2011/04/01/2

http://sourceware.org/bugzilla/show_bug.cgi?id=12625

http://www.mandriva.com/security/advisories?name=MDVSA-2011:178

http://www.mandriva.com/security/advisories?name=MDVSA-2011:179

http://www.redhat.com/support/errata/RHSA-2011-1526.html

http://www.securityfocus.com/bid/46740

https://bugzilla.redhat.com/show_bug.cgi?id=688980

Details

Source: MITRE

Published: 2011-04-10

Updated: 2016-12-07

Type: CWE-16

Risk Information

CVSS v2

Base Score: 3.3

Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 3.4

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*

cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:* versions up to 2.13 (inclusive)

Tenable Plugins

View all (30 total)

IDNameProductFamilySeverity
89038VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0013) (remote check)NessusMisc.
high
83597SUSE SLES10 Security Update : glibc (SUSE-SU-2013:1287-1)NessusSuSE Local Security Checks
medium
83594SUSE SLES11 Security Update : glibc (SUSE-SU-2013:1251-1)NessusSuSE Local Security Checks
medium
83565SUSE SLED10 / SLES10 Security Update : glibc (SUSE-SU-2012:1488-1)NessusSuSE Local Security Checks
medium
81118OracleVM 3.2 : glibc (OVMSA-2015-0023) (GHOST)NessusOracleVM Local Security Checks
high
79283RHEL 5 : rhev-hypervisor5 (RHSA-2012:0168)NessusRed Hat Local Security Checks
high
75974openSUSE Security Update : ncpfs (openSUSE-SU-2011:0985-1)NessusSuSE Local Security Checks
medium
75680openSUSE Security Update : ncpfs (openSUSE-SU-2011:0985-1)NessusSuSE Local Security Checks
medium
71167GLSA-201312-01 : GNU C Library: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
70886ESXi 5.1 < Build 1063671 Multiple Vulnerabilities (remote check)NessusMisc.
medium
70885ESXi 5.0 < Build 912577 Multiple Vulnerabilities (remote check)NessusMisc.
high
68456Oracle Linux 5 : glibc (ELSA-2012-0126)NessusOracle Linux Local Security Checks
medium
68455Oracle Linux 4 : glibc (ELSA-2012-0125)NessusOracle Linux Local Security Checks
high
63332VMSA-2012-0018 : VMware security updates for vCSA and ESXiNessusVMware ESX Local Security Checks
high
62960SuSE 10 Security Update : glibc (ZYPP Patch Number 8351)NessusSuSE Local Security Checks
medium
61938Mandriva Linux Security Advisory : glibc (MDVSA-2011:179)NessusMandriva Local Security Checks
medium
61747VMSA-2012-0013 : VMware vSphere and vCOps updates to third-party librariesNessusVMware ESX Local Security Checks
critical
61244Scientific Linux Security Update : glibc on SL5.x i386/x86_64 (20120213)NessusScientific Linux Local Security Checks
medium
61243Scientific Linux Security Update : glibc on SL4.x i386/x86_64 (20120213)NessusScientific Linux Local Security Checks
high
61187Scientific Linux Security Update : glibc on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
medium
58318Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : eglibc, glibc vulnerabilities (USN-1396-1)NessusUbuntu Local Security Checks
high
57929RHEL 5 : glibc (RHSA-2012:0126)NessusRed Hat Local Security Checks
medium
57928RHEL 4 : glibc (RHSA-2012:0125)NessusRed Hat Local Security Checks
high
57924CentOS 5 : glibc (CESA-2012:0126)NessusCentOS Local Security Checks
medium
57923CentOS 4 : glibc (CESA-2012:0125)NessusCentOS Local Security Checks
high
57231SuSE 10 Security Update : ncpfs (ZYPP Patch Number 7711)NessusSuSE Local Security Checks
medium
57120SuSE 11.1 Security Update : ncpfs (SAT Patch Number 5045)NessusSuSE Local Security Checks
medium
57011RHEL 6 : glibc (RHSA-2011:1526)NessusRed Hat Local Security Checks
medium
56953Mandriva Linux Security Advisory : glibc (MDVSA-2011:178)NessusMandriva Local Security Checks
medium
56610SuSE 10 Security Update : ncpfs (ZYPP Patch Number 7710)NessusSuSE Local Security Checks
medium