Vulnerability Details : CVE-2011-0543
Certain legacy functionality in fusermount in fuse 2.8.5 and earlier, when util-linux does not support the --no-canonicalize option, allows local users to bypass intended access restrictions and unmount arbitrary directories via a symlink attack.
Exploit prediction scoring system (EPSS) score for CVE-2011-0543
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-0543
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.3
|
LOW | AV:L/AC:M/Au:N/C:N/I:P/A:P |
3.4
|
4.9
|
NIST |
CWE ids for CVE-2011-0543
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0543
-
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2011:005
-
http://fuse.git.sourceforge.net/git/gitweb.cgi?p=fuse/fuse%3Ba=commit%3Bh=cbd3a2a84068aae6e3fe32939d88470d712dbf47
Filesystem in Userspace / None tools
-
http://www.openwall.com/lists/oss-security/2011/02/02/2
oss-security - CVE request: fusePatch
-
http://www.openwall.com/lists/oss-security/2011/02/08/4
oss-security - Re: CVE request: fusePatch
-
http://www.openwall.com/lists/oss-security/2011/02/03/5
oss-security - Re: CVE request: fusePatch
Products affected by CVE-2011-0543
- cpe:2.3:a:fuse:fuse:*:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.3:pre:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:1.9:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.0:pre0:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:fuse:fuse:2.8.4:*:*:*:*:*:*:*