LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 25th, 2014
Linux Advisory Watch: July 18th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: 2010:061: ncpfs Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Multiple vulnerabilities has been found and corrected in ncpfs: sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary [More...]
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2010:061
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : ncpfs
 Date    : March 11, 2010
 Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
           Enterprise Server 5.0, Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in ncpfs:
 
 sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed
 error messages about the results of privileged file-access attempts,
 which allows local users to determine the existence of arbitrary
 files via the mountpoint name (CVE-2010-0790).
 
 The (1) ncpmount, (2) ncpumount, and (3) ncplogin programs in ncpfs
 2.2.6 do not properly create lock files, which allows local users
 to cause a denial of service (application failure) via unspecified
 vectors that trigger the creation of a /etc/mtab~ file that persists
 after the program exits (CVE-2010-0791).
 
 Packages for 2008.0 are provided for Corporate Desktop 2008.0
 customers.
 
 The updated packages have been patched to correct these issues.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0790
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0791
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.0:
 f7a8ca8faffce840a6814724a9f4e13a  2008.0/i586/ipxutils-2.2.6-3.2mdv2008.0.i586.rpm
 e26483fd14e02674e71ad594181ed79e  2008.0/i586/libncpfs2.3-2.2.6-3.2mdv2008.0.i586.rpm
 9451cbbdd8249de6f9c6b2419ae747f9  2008.0/i586/libncpfs2.3-devel-2.2.6-3.2mdv2008.0.i586.rpm
 84d5f1ef0b99acc91bb24554f3f77ae1  2008.0/i586/ncpfs-2.2.6-3.2mdv2008.0.i586.rpm 
 5fefe503c4ae846c53e1311c9b7d0fd9  2008.0/SRPMS/ncpfs-2.2.6-3.2mdv2008.0.src.rpm

 Mandriva Linux 2008.0/X86_64:
 317825e9ba230cb79948eabfffb909f3  2008.0/x86_64/ipxutils-2.2.6-3.2mdv2008.0.x86_64.rpm
 532c1b50f1e7e3c18a8e78c6d9a99674  2008.0/x86_64/lib64ncpfs2.3-2.2.6-3.2mdv2008.0.x86_64.rpm
 05509d44fa66199cce0e607f5f748ce8  2008.0/x86_64/lib64ncpfs2.3-devel-2.2.6-3.2mdv2008.0.x86_64.rpm
 755ee4bbf43040f15faeefad1d6b9bd1  2008.0/x86_64/ncpfs-2.2.6-3.2mdv2008.0.x86_64.rpm 
 5fefe503c4ae846c53e1311c9b7d0fd9  2008.0/SRPMS/ncpfs-2.2.6-3.2mdv2008.0.src.rpm

 Mandriva Linux 2009.0:
 df608af475e518bc672ec54080a71129  2009.0/i586/ipxutils-2.2.6-6.2mdv2009.0.i586.rpm
 bc02fbfe14425e3a3085c9b08c99ae1c  2009.0/i586/libncpfs2.3-2.2.6-6.2mdv2009.0.i586.rpm
 ee0c1b55e7d8135de3d904de32fffba4  2009.0/i586/libncpfs-devel-2.2.6-6.2mdv2009.0.i586.rpm
 32a63bfd400cd0a12cf2f98dbbb2fe37  2009.0/i586/ncpfs-2.2.6-6.2mdv2009.0.i586.rpm 
 c80af8183956c89533f5d29018a5da3f  2009.0/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 8e2466b981f678e0300c005d2891b727  2009.0/x86_64/ipxutils-2.2.6-6.2mdv2009.0.x86_64.rpm
 853cf68f0b74bb5338b4a59a2c851f3f  2009.0/x86_64/lib64ncpfs2.3-2.2.6-6.2mdv2009.0.x86_64.rpm
 784e732a2fc55020081a49f08860c0b4  2009.0/x86_64/lib64ncpfs-devel-2.2.6-6.2mdv2009.0.x86_64.rpm
 2c60654e5812e8b2bed23dd25b92a2e6  2009.0/x86_64/ncpfs-2.2.6-6.2mdv2009.0.x86_64.rpm 
 c80af8183956c89533f5d29018a5da3f  2009.0/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 550f4e8f2220a1f9897e8acf9c8aa35d  2009.1/i586/ipxutils-2.2.6-7.2mdv2009.1.i586.rpm
 99a731ac177a83950ec5d08a1a2f74cf  2009.1/i586/libncpfs2.3-2.2.6-7.2mdv2009.1.i586.rpm
 5ffd14de2ec5a3585967ca0bdcff5268  2009.1/i586/libncpfs-devel-2.2.6-7.2mdv2009.1.i586.rpm
 04232470e8c0206cf211d2bb991eb5f2  2009.1/i586/ncpfs-2.2.6-7.2mdv2009.1.i586.rpm 
 f9959c23aba2806c3f7fd3078b58d233  2009.1/SRPMS/ncpfs-2.2.6-7.2mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 11400b2d8f1e646ce3913d6a4f9370dc  2009.1/x86_64/ipxutils-2.2.6-7.2mdv2009.1.x86_64.rpm
 90c272182b6d9fb9fdc64dec5ae2a030  2009.1/x86_64/lib64ncpfs2.3-2.2.6-7.2mdv2009.1.x86_64.rpm
 66cfe5705b55b4c1aaa0907dabf77a91  2009.1/x86_64/lib64ncpfs-devel-2.2.6-7.2mdv2009.1.x86_64.rpm
 0ff7654b1c841d8a1fb9d4c45d808306  2009.1/x86_64/ncpfs-2.2.6-7.2mdv2009.1.x86_64.rpm 
 f9959c23aba2806c3f7fd3078b58d233  2009.1/SRPMS/ncpfs-2.2.6-7.2mdv2009.1.src.rpm

 Mandriva Linux 2010.0:
 f848b1bfb0d52e4dcdec0b9808ac509a  2010.0/i586/ipxutils-2.2.6-7.2mdv2010.0.i586.rpm
 54aa704c0b1af11e042dcd9672de3e25  2010.0/i586/libncpfs2.3-2.2.6-7.2mdv2010.0.i586.rpm
 93a2e667cd3543960897e35d2cb0cab8  2010.0/i586/libncpfs-devel-2.2.6-7.2mdv2010.0.i586.rpm
 1f8d2304c8140ef4a9f86c5f91dc2503  2010.0/i586/ncpfs-2.2.6-7.2mdv2010.0.i586.rpm 
 832c3cf3bd76b027e3551f21c42d4e63  2010.0/SRPMS/ncpfs-2.2.6-7.2mdv2010.0.src.rpm

 Mandriva Linux 2010.0/X86_64:
 7a92ccdf00e1969312ceba039a383c5b  2010.0/x86_64/ipxutils-2.2.6-7.2mdv2010.0.x86_64.rpm
 090c7dfaa946377d3973e059133db67c  2010.0/x86_64/lib64ncpfs2.3-2.2.6-7.2mdv2010.0.x86_64.rpm
 b3157282b6c4a3b8d2e5c996a9dc48b4  2010.0/x86_64/lib64ncpfs-devel-2.2.6-7.2mdv2010.0.x86_64.rpm
 722201fa17838a7bbcf75afe9e51d0b9  2010.0/x86_64/ncpfs-2.2.6-7.2mdv2010.0.x86_64.rpm 
 832c3cf3bd76b027e3551f21c42d4e63  2010.0/SRPMS/ncpfs-2.2.6-7.2mdv2010.0.src.rpm

 Corporate 4.0:
 36221d2e2f7f7b6f1afaf8a0fbb4cc43  corporate/4.0/i586/ipxutils-2.2.6-1.2.20060mlcs4.i586.rpm
 04ed54c9ef53c7b7bc8d6c5bc82875ec  corporate/4.0/i586/libncpfs2.3-2.2.6-1.2.20060mlcs4.i586.rpm
 ffc910168a47678c9e26b8a999eebba1  corporate/4.0/i586/libncpfs2.3-devel-2.2.6-1.2.20060mlcs4.i586.rpm
 d62caa887b9a0afede029092cb94210c  corporate/4.0/i586/ncpfs-2.2.6-1.2.20060mlcs4.i586.rpm 
 ad5fc693c4b8099f793e60fd8e362497  corporate/4.0/SRPMS/ncpfs-2.2.6-1.2.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 010aac4bbd8b97be07f4cf95728aa73f  corporate/4.0/x86_64/ipxutils-2.2.6-1.2.20060mlcs4.x86_64.rpm
 dafdc2c37fd80aa4dd23e909cb443600  corporate/4.0/x86_64/lib64ncpfs2.3-2.2.6-1.2.20060mlcs4.x86_64.rpm
 82ddb2436bdf862367339606b2458373  corporate/4.0/x86_64/lib64ncpfs2.3-devel-2.2.6-1.2.20060mlcs4.x86_64.rpm
 2102a419baacc322e3323a2db9b7bd0c  corporate/4.0/x86_64/ncpfs-2.2.6-1.2.20060mlcs4.x86_64.rpm 
 ad5fc693c4b8099f793e60fd8e362497  corporate/4.0/SRPMS/ncpfs-2.2.6-1.2.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 67e97534bae7efeb19fbcc9903b6abc0  mes5/i586/ipxutils-2.2.6-6.2mdvmes5.i586.rpm
 9a40d5174ab91bbce961034c60708f15  mes5/i586/libncpfs2.3-2.2.6-6.2mdvmes5.i586.rpm
 5ae0613e36539f1be008969522dbaa95  mes5/i586/libncpfs-devel-2.2.6-6.2mdvmes5.i586.rpm
 30b0ec51a7ab456ecaeb3d98fc6ba292  mes5/i586/ncpfs-2.2.6-6.2mdvmes5.i586.rpm 
 c16bd63bb48549bbee38c14b280c5d54  mes5/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 2ea07838c868cf99959b263831cfe51f  mes5/x86_64/ipxutils-2.2.6-6.2mdvmes5.x86_64.rpm
 28c1d5b37556e3143badbf296e6faf59  mes5/x86_64/lib64ncpfs2.3-2.2.6-6.2mdvmes5.x86_64.rpm
 5b697ab26fa6709fd6fb759c0893921e  mes5/x86_64/lib64ncpfs-devel-2.2.6-6.2mdvmes5.x86_64.rpm
 b9674e0cbbb6c61f711760fa05152d26  mes5/x86_64/ncpfs-2.2.6-6.2mdvmes5.x86_64.rpm 
 c16bd63bb48549bbee38c14b280c5d54  mes5/SRPMS/ncpfs-2.2.6-6.2mdv2009.0.src.rpm

 Multi Network Firewall 2.0:
 8024befbd43bcf81f84103753610bbb7  mnf/2.0/i586/ipxutils-2.2.6-0.3.M20mdk.i586.rpm
 d97f0d32ad39007d7b2c4634bc84fd27  mnf/2.0/i586/libncpfs2.3-2.2.6-0.3.M20mdk.i586.rpm
 027010fa612a861b59e7b2fb15d7b834  mnf/2.0/i586/libncpfs2.3-devel-2.2.6-0.3.M20mdk.i586.rpm
 4c0f378c6fcc6e2f44688d85435aa439  mnf/2.0/i586/ncpfs-2.2.6-0.3.M20mdk.i586.rpm 
 5a0d9c59bc8086de2bff5667368410e4  mnf/2.0/SRPMS/ncpfs-2.2.6-0.3.M20mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Four fake Google haxbots hit YOUR WEBSITE every day
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
The Barnaby Jack Few Knew: Celebrated Hacker Saw Spotlight as 'Necessary Evil'
What I Learned from Edward Snowden at the Hacker Conference
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.