CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2009-1072

nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
Publish Date : 2009-03-25 Last Update Date : 2020-09-02
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
4.9
Confidentiality Impact None (There is no impact to the confidentiality of the system.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact None (There is no impact to the availability of the system.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s)
CWE ID 16

- Vendor Statements

This issue has been rated as having moderate security impact. It was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG, via https://rhn.redhat.com/errata/RHSA-2009-1132.html , https://rhn.redhat.com/errata/RHSA-2009-1106.html , and https://rhn.redhat.com/errata/RHSA-2009-1081.html . This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed. For further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/ .
Source: Redhat

- Additional Vendor Supplied Data

Vendor Impact CVSS Score CVSS Vector Report Date Publish Date
Redhat moderate
6.2
AV:L/AC:H/Au:N/C:C/I:C/A:C 2009-03-23 2009-03-19
If you are a vendor and you have additional data which can be automatically imported into our database, please contact admin @ cvedetails.com

- Related OVAL Definitions

Title Definition Id Class Family
CVE-2009-1072 oval:org.opensuse.security:def:20091072 unix
DSA-1800 linux-2.6 -- denial of service/privilege escalation/sensitive memory leak oval:org.mitre.oval:def:8300 unix
DSA-1800-1 linux-2.6 -- denial of service/privilege escalation/sensitive memory leak oval:org.mitre.oval:def:13750 unix
ELSA-2009:1106: kernel security and bug fix update (Important) oval:org.mitre.oval:def:22334 unix
nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thre... oval:org.mitre.oval:def:10314 unix
RHSA-2009:1106 -- kernel security and bug fix update (Important) oval:org.mitre.oval:def:28617 unix
RHSA-2009:1106: kernel security and bug fix update (Important) oval:com.redhat.rhsa:def:20091106 unix
RHSA-2009:1132: kernel security and bug fix update (Important) oval:com.redhat.rhsa:def:20091132 unix
USN-793-1 -- linux, linux-source-2.6.15 vulnerabilities oval:org.mitre.oval:def:13579 unix
VMware kernel nfsd vulnerability oval:org.mitre.oval:def:8382 unix
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2009-1072

# Product Type Vendor Product Version Update Edition Language
1 OS Canonical Ubuntu Linux 6.06 * * * Version Details Vulnerabilities
2 OS Canonical Ubuntu Linux 8.04 * * * Version Details Vulnerabilities
3 OS Canonical Ubuntu Linux 8.10 * * * Version Details Vulnerabilities
4 OS Canonical Ubuntu Linux 9.04 * * * Version Details Vulnerabilities
5 OS Debian Debian Linux 4.0 * * * Version Details Vulnerabilities
6 OS Debian Debian Linux 5.0 * * * Version Details Vulnerabilities
7 OS Linux Linux Kernel * * * * Version Details Vulnerabilities
8 OS Opensuse Opensuse 10.3 * * * Version Details Vulnerabilities
9 OS Opensuse Opensuse 11.0 * * * Version Details Vulnerabilities
10 OS Opensuse Opensuse 11.1 * * * Version Details Vulnerabilities
11 OS Suse Linux Enterprise Desktop 10 SP2 * * Version Details Vulnerabilities
12 OS Suse Linux Enterprise Server 10 SP2 * * Version Details Vulnerabilities
13 OS Vmware ESX 3.0.3 * * * Version Details Vulnerabilities
14 OS Vmware ESX 3.5 * * * Version Details Vulnerabilities
15 OS Vmware ESX 4.0 * * * Version Details Vulnerabilities
16 Application Vmware Server 2.0.0 * * * Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Canonical Ubuntu Linux 4
Debian Debian Linux 2
Linux Linux Kernel 1
Opensuse Opensuse 3
Suse Linux Enterprise Desktop 1
Suse Linux Enterprise Server 1
Vmware ESX 3
Vmware Server 1

- References For CVE-2009-1072

http://www.vupen.com/english/advisories/2009/3316
VUPEN ADV-2009-3316
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
SUSE SUSE-SA:2009:030
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
SUSE SUSE-SA:2009:031
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
SUSE SUSE-SA:2009:028
http://secunia.com/advisories/35121
SECUNIA 35121
http://www.debian.org/security/2009/dsa-1800
DEBIAN DSA-1800
http://secunia.com/advisories/35185
SECUNIA 35185
http://www.redhat.com/support/errata/RHSA-2009-1081.html
REDHAT RHSA-2009:1081
http://secunia.com/advisories/35394
SECUNIA 35394
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.9 CONFIRM
http://www.openwall.com/lists/oss-security/2009/03/23/1
MLIST [oss-security] 20090323 CVE request: kernel: nfsd did not drop CAP_MKNOD for non-root
http://www.securityfocus.com/bid/34205
BID 34205 Linux Kernel nfsd 'CAP_MKNOD' Unauthorized Access Vulnerability Release Date:2009-11-24
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html
SUSE SUSE-SA:2009:021
http://secunia.com/advisories/34786
SECUNIA 34786
http://www.vupen.com/english/advisories/2009/0802
VUPEN ADV-2009-0802
http://secunia.com/advisories/34432
SECUNIA 34432
http://secunia.com/advisories/35390
SECUNIA 35390
http://secunia.com/advisories/34422
SECUNIA 34422
http://thread.gmane.org/gmane.linux.kernel/805280
MLIST [linux-kernel] 20090311 VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=76a67ec6fb79ff3570dcb5342142c16098299911 CONFIRM
http://secunia.com/advisories/37471
SECUNIA 37471
http://www.vmware.com/security/advisories/VMSA-2009-0016.html CONFIRM
http://secunia.com/advisories/35656
SECUNIA 35656
http://www.ubuntu.com/usn/usn-793-1
UBUNTU USN-793-1
http://secunia.com/advisories/35343
SECUNIA 35343
https://exchange.xforce.ibmcloud.com/vulnerabilities/49356
XF linux-kernel-capmknod-security-bypass(49356)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8382
OVAL oval:org.mitre.oval:def:8382
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10314
OVAL oval:org.mitre.oval:def:10314
http://www.securityfocus.com/archive/1/507985/100/0/threaded
BUGTRAQ 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components

- Vulnerability Conditions

Vulnerability is valid if product versions listed below are used 0
Vulnerability is valid if product versions listed below are used 0
Vulnerability is valid if product versions listed below are used 0
Vulnerability is valid if product versions listed below are used 0
Vulnerability is valid if product versions listed below are used 0
Vulnerability is valid if product versions listed below are used 0
Vulnerability is valid if product versions listed below are used 0

- Metasploit Modules Related To CVE-2009-1072

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.