SB2019102928 - Multiple vulnerabilities in linux-nfs RPCBind
Published: October 29, 2019 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2010-2061)
The vulnerability allows a local authenticated user to execute arbitrary code.
rpcbind 0.2.0 does not properly validate (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr, which can be created by an attacker before the daemon is started.
2) Link following (CVE-ID: CVE-2010-2064)
The vulnerability allows a local authenticated user to read and manipulate data.
rpcbind 0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /tmp/portmap.xdr and (2) /tmp/rpcbind.xdr.
Remediation
Install update from vendor's website.
References
- https://access.redhat.com/security/cve/cve-2010-2061
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583435#5
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2061
- https://security-tracker.debian.org/tracker/CVE-2010-2061
- https://www.openwall.com/lists/oss-security/2010/06/08/3
- https://access.redhat.com/security/cve/cve-2010-2064
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-2064
- https://security-tracker.debian.org/tracker/CVE-2010-2064