EulerOS Virtualization 2.5.3 : fuse (EulerOS-SA-2019-1186)

high Nessus Plugin ID 123872

Language:

Synopsis

The remote EulerOS Virtualization host is missing a security update.

Description

According to the version of the fuse packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerability :

- A vulnerability was discovered in fuse. When SELinux is active, fusermount is vulnerable to a restriction bypass. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.i1/4^CVE-2018-10906i1/4%0

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected fuse package.

See Also

http://www.nessus.org/u?d221a027

Plugin Details

Severity: High

ID: 123872

File Name: EulerOS_SA-2019-1186.nasl

Version: 1.7

Type: local

Published: 4/9/2019

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:fuse, p-cpe:/a:huawei:euleros:fuse-devel, p-cpe:/a:huawei:euleros:fuse-libs, cpe:/o:huawei:euleros:uvp:2.5.3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/2/2019

Reference Information

CVE: CVE-2018-10906