Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2022-29869
Disclosure Date: April 28, 2022 (last updated October 07, 2023)
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.
0
Attacker Value
Unknown
CVE-2022-27239
Disclosure Date: April 27, 2022 (last updated October 07, 2023)
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
0
Attacker Value
Unknown
CVE-2021-20208
Disclosure Date: April 19, 2021 (last updated November 08, 2023)
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
0
Attacker Value
Unknown
CVE-2020-14342
Disclosure Date: September 09, 2020 (last updated November 08, 2023)
It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
0
Attacker Value
Unknown
CVE-2014-2830
Disclosure Date: March 31, 2015 (last updated October 05, 2023)
Stack-based buffer overflow in cifskey.c or cifscreds.c in cifs-utils before 6.4, as used in pam_cifscreds, allows remote attackers to have unspecified impact via unknown vectors.
0
Attacker Value
Unknown
CVE-2012-1586
Disclosure Date: August 27, 2012 (last updated October 05, 2023)
mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
0