Executive Summary

Informations
Name CVE-2010-2192 First vendor Publication 2010-06-18
Vendor Cve Last vendor Modification 2010-06-22

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score 1.9 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The make_lockdir_name function in policy.c in pmount 0.9.18 allow local users to overwrite arbitrary files via a symlink attack on a file in /var/lock/.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2192

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-59 Improper Link Resolution Before File Access ('Link Following')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:11705
 
Oval ID: oval:org.mitre.oval:def:11705
Title: DSA-2063 pmount -- insecure temporary file
Description: Dan Rosenberg discovered that pmount, a wrapper around the standard mount program which permits normal users to mount removable devices without a matching /etc/fstab entry, creates files in /var/lock insecurely. A local attacker could overwrite arbitrary files utilising a symlink attack.
Family: unix Class: patch
Reference(s): DSA-2063
CVE-2010-2192
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): pmount
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13548
 
Oval ID: oval:org.mitre.oval:def:13548
Title: DSA-2063-1 pmount -- insecure temporary file
Description: Dan Rosenberg discovered that pmount, a wrapper around the standard mount program which permits normal users to mount removable devices without a matching /etc/fstab entry, creates files in /var/lock insecurely. A local attacker could overwrite arbitrary files utilising a symlink attack. For the stable distribution, this problem has been fixed in version 0.9.18-2+lenny1 For the unstable distribution, this problem has been fixed in version 0.9.23-1, and will migrate to the testing distribution shortly. We recommend that you upgrade your pmount package.
Family: unix Class: patch
Reference(s): DSA-2063-1
CVE-2010-2192
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): pmount
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

OpenVAS Exploits

Date Description
2010-07-06 Name : Debian Security Advisory DSA 2063-1 (pmount)
File : nvt/deb_2063_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
65630 pmount policy.c make_lockdir_name Function Temporary File Symlink Arbitrary F...

Nessus® Vulnerability Scanner

Date Description
2014-12-15 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201412-08.nasl - Type : ACT_GATHER_INFO
2010-06-21 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2063.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/40939
CONFIRM http://security.debian.org/pool/updates/main/p/pmount/pmount_0.9.18-2+lenny1....
DEBIAN http://www.debian.org/security/2010/dsa-2063
VUPEN http://www.vupen.com/english/advisories/2010/1520

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2020-05-23 00:25:56
  • Multiple Updates
2014-12-16 13:24:39
  • Multiple Updates
2014-02-17 10:55:52
  • Multiple Updates
2013-05-10 23:26:44
  • Multiple Updates