EulerOS Virtualization 3.0.2.2 : cifs-utils (EulerOS-SA-2021-2130)

high Nessus Plugin ID 151896

Synopsis

The remote EulerOS Virtualization host is missing a security update.

Description

According to the version of the cifs-utils package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerability :

- The SMB/CIFS protocol is a standard file sharing protocol widely deployedon Microsoft Windows machines.
This package contains tools for mountingshares on Linux using the SMB/CIFS protocol. The tools in this packagework in conjunction with support in the kernel to allow one to mount aSMB/CIFS share onto a client and use it as if it were a standard Linuxfile system.Security Fix(es):It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.(CVE-2020-14342)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected cifs-utils package.

See Also

http://www.nessus.org/u?2e3cfbd8

Plugin Details

Severity: High

ID: 151896

File Name: EulerOS_SA-2021-2130.nasl

Version: 1.3

Type: local

Published: 7/21/2021

Updated: 12/7/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.4

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-14342

CVSS v3

Risk Factor: High

Base Score: 7

Temporal Score: 6.3

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:cifs-utils, cpe:/o:huawei:euleros:uvp:3.0.2.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/6/2021

Reference Information

CVE: CVE-2020-14342