CVE-2011-1833

low
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Race condition in the ecryptfs_mount function in fs/ecryptfs/main.c in the eCryptfs subsystem in the Linux kernel before 3.1 allows local users to bypass intended file permissions via a mount.ecryptfs_private mount with a mismatched uid.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=764355487ea220fdc2faf128d577d7f679b91f97

http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00009.html

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1

http://www.ubuntu.com/usn/USN-1188-1

https://bugzilla.redhat.com/show_bug.cgi?id=731172

https://github.com/torvalds/linux/commit/764355487ea220fdc2faf128d577d7f679b91f97

Details

Source: MITRE

Published: 2012-10-03

Updated: 2014-03-08

Type: CWE-264

Risk Information

CVSS v2

Base Score: 3.3

Vector: AV:L/AC:M/Au:N/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 3.4

Severity: LOW

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.35:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.36:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.37:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.38:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.39:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.40:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.41:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.42:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.43:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.0.44 (inclusive)

Tenable Plugins

View all (35 total)

IDNameProductFamilySeverity
89038VMware ESX / ESXi Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0013) (remote check)NessusMisc.
high
79507OracleVM 2.2 : kernel (OVMSA-2013-0039)NessusOracleVM Local Security Checks
high
75881openSUSE Security Update : kernel (openSUSE-SU-2011:1222-1)NessusSuSE Local Security Checks
critical
75821openSUSE Security Update : ecryptfs-utils (openSUSE-SU-2011:0902-1)NessusSuSE Local Security Checks
medium
75556openSUSE Security Update : kernel (openSUSE-SU-2011:1221-1)NessusSuSE Local Security Checks
critical
75473openSUSE Security Update : ecryptfs-utils (openSUSE-SU-2011:0902-1)NessusSuSE Local Security Checks
medium
69575Amazon Linux AMI : kernel (ALAS-2011-16)NessusAmazon Linux Local Security Checks
critical
68422Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2011-2029)NessusOracle Linux Local Security Checks
medium
68375Oracle Linux 5 : kernel (ELSA-2011-1386)NessusOracle Linux Local Security Checks
critical
68364Oracle Linux 6 : kernel (ELSA-2011-1350)NessusOracle Linux Local Security Checks
medium
68338Oracle Linux 5 / 6 : ecryptfs-utils (ELSA-2011-1241)NessusOracle Linux Local Security Checks
critical
61747VMSA-2012-0013 : VMware vSphere and vCOps updates to third-party librariesNessusVMware ESX Local Security Checks
critical
61162Scientific Linux Security Update : kernel on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
critical
61148Scientific Linux Security Update : kernel on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
medium
58486Debian DSA-2443-1 : linux-2.6 - privilege escalation/denial of serviceNessusDebian Local Security Checks
high
57297SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 5493 / 5510 / 5511)NessusSuSE Local Security Checks
high
56768Ubuntu 10.04 LTS : linux-lts-backport-natty vulnerabilities (USN-1256-1)NessusUbuntu Local Security Checks
critical
56747Ubuntu 10.04 LTS : linux vulnerabilities (USN-1253-1)NessusUbuntu Local Security Checks
critical
56644Ubuntu 10.10 : linux-mvl-dove vulnerabilities (USN-1245-1)NessusUbuntu Local Security Checks
critical
56639Ubuntu 10.04 LTS : linux-mvl-dove vulnerabilities (USN-1240-1)NessusUbuntu Local Security Checks
critical
56638Ubuntu 10.04 LTS : linux-ec2 vulnerabilities (USN-1239-1)NessusUbuntu Local Security Checks
critical
56577RHEL 5 : kernel (RHSA-2011:1386)NessusRed Hat Local Security Checks
critical
56569CentOS 5 : kernel (CESA-2011:1386)NessusCentOS Local Security Checks
critical
56466Ubuntu 10.10 : linux vulnerabilities (USN-1227-1)NessusUbuntu Local Security Checks
critical
56404RHEL 6 : kernel (RHSA-2011:1350)NessusRed Hat Local Security Checks
medium
56344Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1219-1)NessusUbuntu Local Security Checks
critical
56273CentOS 5 : ecryptfs-utils (CESA-2011:1241)NessusCentOS Local Security Checks
critical
56257USN-1212-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
high
56256Ubuntu 11.04 : linux vulnerabilities (USN-1211-1)NessusUbuntu Local Security Checks
high
56192USN-1204-1 : linux-fsl-imx51 vulnerabilitiesNessusUbuntu Local Security Checks
high
56190USN-1202-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
high
56028RHEL 5 / 6 : ecryptfs-utils (RHSA-2011:1241)NessusRed Hat Local Security Checks
critical
55827SuSE 11.1 Security Update : ecryptfs-utils (SAT Patch Number 4956)NessusSuSE Local Security Checks
medium
55810Ubuntu 10.04 LTS / 10.10 / 11.04 : ecryptfs-utils vulnerabilities (USN-1188-1)NessusUbuntu Local Security Checks
medium
801510CentOS RHSA-2011-1386 Security CheckLog Correlation EngineGeneric
high