CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
59.9%
Debian Security Advisory DSA-2382-1 [email protected]
http://www.debian.org/security/ Jonathan Wiltshire
January 07, 2012 http://www.debian.org/security/faq
Package : ecryptfs-utils
Vulnerability : multiple
Problem type : local
Debian-specific: no
CVE ID : CVE-2011-1831 CVE-2011-1832 CVE-2011-1834 CVE-2011-1835
CVE-2011-1837 CVE-2011-3145
Several problems have been discovered in ecryptfs-utils, a cryptographic
filesystem for Linux.
CVE-2011-1831
Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs
incorrectly validated permissions on the requested mountpoint. A local
attacker could use this flaw to mount to arbitrary locations, leading
to privilege escalation.
CVE-2011-1832
Vasiliy Kulikov of Openwall and Dan Rosenberg discovered that eCryptfs
incorrectly validated permissions on the requested mountpoint. A local
attacker could use this flaw to unmount to arbitrary locations, leading
to a denial of service.
CVE-2011-1834
Dan Rosenberg and Marc Deslauriers discovered that eCryptfs incorrectly
handled modifications to the mtab file when an error occurs. A local
attacker could use this flaw to corrupt the mtab file, and possibly
unmount arbitrary locations, leading to a denial of service.
CVE-2011-1835
Marc Deslauriers discovered that eCryptfs incorrectly handled keys when
setting up an encrypted private directory. A local attacker could use
this flaw to manipulate keys during creation of a new user.
CVE-2011-1837
Vasiliy Kulikov of Openwall discovered that eCryptfs incorrectly handled
lock counters. A local attacker could use this flaw to possibly overwrite
arbitrary files.
We acknowledge the work of the Ubuntu distribution in preparing patches
suitable for near-direct inclusion in the Debian package.
For the oldstable distribution (lenny), these problems have been fixed in
version 68-1+lenny1.
For the stable distribution (squeeze), these problems have been fixed in
version 83-4+squeeze1.
For the testing distribution (wheezy) and the unstable distribution (sid),
these problems have been fixed in version 95-1.
We recommend that you upgrade your ecryptfs-utils packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 6 | mips | ecryptfs-utils | < 83-4+squeeze1 | ecryptfs-utils_83-4+squeeze1_mips.deb |
Debian | 5 | ia64 | ecryptfs-utils | < 68-1+lenny1 | ecryptfs-utils_68-1+lenny1_ia64.deb |
Debian | 6 | ia64 | ecryptfs-utils-dbg | < 83-4+squeeze1 | ecryptfs-utils-dbg_83-4+squeeze1_ia64.deb |
Debian | 6 | powerpc | ecryptfs-utils-dbg | < 83-4+squeeze1 | ecryptfs-utils-dbg_83-4+squeeze1_powerpc.deb |
Debian | 6 | s390 | ecryptfs-utils-dbg | < 83-4+squeeze1 | ecryptfs-utils-dbg_83-4+squeeze1_s390.deb |
Debian | 6 | armel | libecryptfs-dev | < 83-4+squeeze1 | libecryptfs-dev_83-4+squeeze1_armel.deb |
Debian | 6 | i386 | libecryptfs-dev | < 83-4+squeeze1 | libecryptfs-dev_83-4+squeeze1_i386.deb |
Debian | 6 | powerpc | libecryptfs-dev | < 83-4+squeeze1 | libecryptfs-dev_83-4+squeeze1_powerpc.deb |
Debian | 6 | sparc | libecryptfs-dev | < 83-4+squeeze1 | libecryptfs-dev_83-4+squeeze1_sparc.deb |
Debian | 6 | armel | ecryptfs-utils | < 83-4+squeeze1 | ecryptfs-utils_83-4+squeeze1_armel.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
59.9%