Security restrictions bypass in fuse3 (Alpine package)



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-10906
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
fuse3 (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Security restrictions bypass

EUVDB-ID: #VU14103

Risk: Low

CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2018-10906

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to insufficient access and privileges controls. A remote attacker can mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration when SELinux is active, trick them into accessing files on that file system, bypass security restrictions and possibly cause the service to crash.

Mitigation

Install update from vendor's website.

Vulnerable software versions

fuse3 (Alpine package): 3.2.2-r0 - 3.2.4-r0

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=c64d6727ac29cbcad712c75e3116f9c761a40b37
https://git.alpinelinux.org/aports/commit/?id=70301513a12b55b20ef51ec2cdb5af989c2fbadc
https://git.alpinelinux.org/aports/commit/?id=91859c0ad3e4c5f77a5234e421fbb81d349d0145
https://git.alpinelinux.org/aports/commit/?id=388d28b0db1e3deeb2e1b7fec47021b849a9c214
https://git.alpinelinux.org/aports/commit/?id=bc0a209d2a3136d9a26a496ffd43ccdb56190fa2
https://git.alpinelinux.org/aports/commit/?id=cab094ae856f8729453475a6c5fff8e35d8844ab
https://git.alpinelinux.org/aports/commit/?id=cb703b0b3b7418593d294739cd51d7f2a711c12a
https://git.alpinelinux.org/aports/commit/?id=fb1ef7588af0704b74a1019ce20c179660197278
https://git.alpinelinux.org/aports/commit/?id=65dd070755a9154570e166cf410d552229f8b285


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###