Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Generic)  >   Util-linux Vendors:   [Multiple Authors/Vendors]
util-linux 'umount' NULL Dereference Lets Local Users Obtain Memory Contents
SecurityTracker Alert ID:  1017729
SecurityTracker URL:
CVE Reference:   CVE-2007-0822   (Links to External Site)
Date:  Mar 7 2007
Impact:   Disclosure of system information
Exploit Included:  Yes  

Description:   A vulnerability was reported in util-linux. A local user can obtain system memory contents.

A remote user can can invoke umount with a pathname for a USB pen drive that was mounted and subsequently physically removed to trigger a NULL dereference, crashing the application. This may allow the local user to obtain potentially sensitive system memory contents.

The original advisory is available at:

Carlos Barros reported this vulnerability.

Impact:   A remote user can obtain portions of system memory.
Solution:   No solution was available at the time of this entry.
Cause:   Access control error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   None.

 Source Message Contents

Date:  Thu Feb 01 2007 - 14:12:03 CST
Subject:  [Full-disclosure] umount crash and xterm (kind of) information leak!

In the past few days I faced two "interesting" situations!
One was a "SEGFAULT" in umount command, and
other is some kind of "information leak" in terminal
emulators (tested in xterm). Here is the link os the posts,
so anyone can check it out.

Sorry for posting links, that is not a ADV. I just didnt want
to post it here again.. ;)



Carlos Barros

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - 

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC