Security restrictions bypass in fuse (Alpine package)



Published: 2018-07-25
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-10906
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
fuse (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU14103

Risk: Low

CVSSv3.1: 6.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-10906

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to insufficient access and privileges controls. A remote attacker can mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration when SELinux is active, trick them into accessing files on that file system, bypass security restrictions and possibly cause the service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

fuse (Alpine package): 2.9.7-r1

External links

http://git.alpinelinux.org/aports/commit/?id=c64d6727ac29cbcad712c75e3116f9c761a40b37
http://git.alpinelinux.org/aports/commit/?id=70301513a12b55b20ef51ec2cdb5af989c2fbadc
http://git.alpinelinux.org/aports/commit/?id=91859c0ad3e4c5f77a5234e421fbb81d349d0145
http://git.alpinelinux.org/aports/commit/?id=388d28b0db1e3deeb2e1b7fec47021b849a9c214
http://git.alpinelinux.org/aports/commit/?id=bc0a209d2a3136d9a26a496ffd43ccdb56190fa2
http://git.alpinelinux.org/aports/commit/?id=cab094ae856f8729453475a6c5fff8e35d8844ab
http://git.alpinelinux.org/aports/commit/?id=cb703b0b3b7418593d294739cd51d7f2a711c12a
http://git.alpinelinux.org/aports/commit/?id=fb1ef7588af0704b74a1019ce20c179660197278
http://git.alpinelinux.org/aports/commit/?id=65dd070755a9154570e166cf410d552229f8b285


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###