Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2007-5191
mount and umount in util-linux and loop-aes-utils call the setuid and setgid functions in the wrong order and do not check the return values, which might allow attackers to gain privileges via helpers such as mount.nfs.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
28.4%
CVSS Severity
CVSS v2 Score
7.2
References
http://bugs.gentoo.org/show_bug.cgi?id=195390
http://frontal2.mandriva.com/en/security/advisories?name=MDKSA-2007:198
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=commit%3Bh=ebbeb2c7ac1b00b6083905957837a271e80b187e
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html
http://lists.vmware.com/pipermail/security-announce/2008/000002.html
http://secunia.com/advisories/27104
http://secunia.com/advisories/27122
http://secunia.com/advisories/27145
http://secunia.com/advisories/27188
http://secunia.com/advisories/27283
http://secunia.com/advisories/27354
http://secunia.com/advisories/27399
http://secunia.com/advisories/27687
http://secunia.com/advisories/28348
http://secunia.com/advisories/28349
http://secunia.com/advisories/28368
http://secunia.com/advisories/28469
http://security.gentoo.org/glsa/glsa-200710-18.xml
http://support.avaya.com/elmodocs2/security/ASA-2008-023.htm
http://www.debian.org/security/2008/dsa-1449
http://www.debian.org/security/2008/dsa-1450
http://www.redhat.com/support/errata/RHSA-2007-0969.html
http://www.securityfocus.com/archive/1/485936/100/0/threaded
http://www.securityfocus.com/archive/1/486859/100/0/threaded
http://www.securityfocus.com/bid/25973
http://www.securitytracker.com/id?1018782
http://www.ubuntu.com/usn/usn-533-1
http://www.vmware.com/security/advisories/VMSA-2008-0001.html
http://www.vupen.com/english/advisories/2007/3417
http://www.vupen.com/english/advisories/2008/0064
https://bugzilla.redhat.com/show_bug.cgi?id=320041
https://issues.rpath.com/browse/RPL-1757
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10101
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00144.html
http://bugs.gentoo.org/show_bug.cgi?id=195390
http://frontal2.mandriva.com/en/security/advisories?name=MDKSA-2007:198
http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git%3Ba=commit%3Bh=ebbeb2c7ac1b00b6083905957837a271e80b187e
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00008.html
http://lists.vmware.com/pipermail/security-announce/2008/000002.html
http://secunia.com/advisories/27104
http://secunia.com/advisories/27122
http://secunia.com/advisories/27145
http://secunia.com/advisories/27188
http://secunia.com/advisories/27283
http://secunia.com/advisories/27354
http://secunia.com/advisories/27399
http://secunia.com/advisories/27687
http://secunia.com/advisories/28348
http://secunia.com/advisories/28349
http://secunia.com/advisories/28368
http://secunia.com/advisories/28469
http://security.gentoo.org/glsa/glsa-200710-18.xml
http://support.avaya.com/elmodocs2/security/ASA-2008-023.htm
http://www.debian.org/security/2008/dsa-1449
http://www.debian.org/security/2008/dsa-1450
http://www.redhat.com/support/errata/RHSA-2007-0969.html
http://www.securityfocus.com/archive/1/485936/100/0/threaded
http://www.securityfocus.com/archive/1/486859/100/0/threaded
http://www.securityfocus.com/bid/25973
http://www.securitytracker.com/id?1018782
http://www.ubuntu.com/usn/usn-533-1
http://www.vmware.com/security/advisories/VMSA-2008-0001.html
http://www.vupen.com/english/advisories/2007/3417
http://www.vupen.com/english/advisories/2008/0064
https://bugzilla.redhat.com/show_bug.cgi?id=320041
https://issues.rpath.com/browse/RPL-1757
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10101
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00144.html
Products affected by CVE-2007-5191
Kernel
»
Util-Linux
»
Version:
N/A
cpe:2.3:a:kernel:util-linux:-
Kernel
»
Util-Linux
»
Version:
2.10f
cpe:2.3:a:kernel:util-linux:2.10f
Kernel
»
Util-Linux
»
Version:
2.10m
cpe:2.3:a:kernel:util-linux:2.10m
Kernel
»
Util-Linux
»
Version:
2.10s
cpe:2.3:a:kernel:util-linux:2.10s
Kernel
»
Util-Linux
»
Version:
2.11b
cpe:2.3:a:kernel:util-linux:2.11b
Kernel
»
Util-Linux
»
Version:
2.11f
cpe:2.3:a:kernel:util-linux:2.11f
Kernel
»
Util-Linux
»
Version:
2.11m
cpe:2.3:a:kernel:util-linux:2.11m
Kernel
»
Util-Linux
»
Version:
2.11n
cpe:2.3:a:kernel:util-linux:2.11n
Kernel
»
Util-Linux
»
Version:
2.11o
cpe:2.3:a:kernel:util-linux:2.11o
Kernel
»
Util-Linux
»
Version:
2.11q
cpe:2.3:a:kernel:util-linux:2.11q
Kernel
»
Util-Linux
»
Version:
2.11r
cpe:2.3:a:kernel:util-linux:2.11r
Kernel
»
Util-Linux
»
Version:
2.11t
cpe:2.3:a:kernel:util-linux:2.11t
Kernel
»
Util-Linux
»
Version:
2.11u
cpe:2.3:a:kernel:util-linux:2.11u
Kernel
»
Util-Linux
»
Version:
2.11v
cpe:2.3:a:kernel:util-linux:2.11v
Kernel
»
Util-Linux
»
Version:
2.11w
cpe:2.3:a:kernel:util-linux:2.11w
Kernel
»
Util-Linux
»
Version:
2.11x
cpe:2.3:a:kernel:util-linux:2.11x
Kernel
»
Util-Linux
»
Version:
2.11y
cpe:2.3:a:kernel:util-linux:2.11y
Kernel
»
Util-Linux
»
Version:
2.12
cpe:2.3:a:kernel:util-linux:2.12
Kernel
»
Util-Linux
»
Version:
2.12a
cpe:2.3:a:kernel:util-linux:2.12a
Kernel
»
Util-Linux
»
Version:
2.12b
cpe:2.3:a:kernel:util-linux:2.12b
Kernel
»
Util-Linux
»
Version:
2.12d
cpe:2.3:a:kernel:util-linux:2.12d
Kernel
»
Util-Linux
»
Version:
2.12h
cpe:2.3:a:kernel:util-linux:2.12h
Kernel
»
Util-Linux
»
Version:
2.12i
cpe:2.3:a:kernel:util-linux:2.12i
Kernel
»
Util-Linux
»
Version:
2.12j
cpe:2.3:a:kernel:util-linux:2.12j
Kernel
»
Util-Linux
»
Version:
2.12k
cpe:2.3:a:kernel:util-linux:2.12k
Kernel
»
Util-Linux
»
Version:
2.12l
cpe:2.3:a:kernel:util-linux:2.12l
Kernel
»
Util-Linux
»
Version:
2.12m
cpe:2.3:a:kernel:util-linux:2.12m
Kernel
»
Util-Linux
»
Version:
2.12o
cpe:2.3:a:kernel:util-linux:2.12o
Kernel
»
Util-Linux
»
Version:
2.12p
cpe:2.3:a:kernel:util-linux:2.12p
Kernel
»
Util-Linux
»
Version:
2.12q
cpe:2.3:a:kernel:util-linux:2.12q
Kernel
»
Util-Linux
»
Version:
2.12r
cpe:2.3:a:kernel:util-linux:2.12r
Kernel
»
Util-Linux
»
Version:
2.13
cpe:2.3:a:kernel:util-linux:2.13
Kernel
»
Util-Linux
»
Version:
2.13.0.1
cpe:2.3:a:kernel:util-linux:2.13.0.1
Kernel
»
Util-Linux
»
Version:
2.13.1
cpe:2.3:a:kernel:util-linux:2.13.1
Kernel
»
Util-Linux
»
Version:
2.13.1.1
cpe:2.3:a:kernel:util-linux:2.13.1.1
Kernel
»
Util-Linux
»
Version:
2.2
cpe:2.3:a:kernel:util-linux:2.2
Kernel
»
Util-Linux
»
Version:
2.5
cpe:2.3:a:kernel:util-linux:2.5
Kernel
»
Util-Linux
»
Version:
2.7.1
cpe:2.3:a:kernel:util-linux:2.7.1
Kernel
»
Util-Linux
»
Version:
2.8
cpe:2.3:a:kernel:util-linux:2.8
Kernel
»
Util-Linux
»
Version:
2.9i
cpe:2.3:a:kernel:util-linux:2.9i
Kernel
»
Util-Linux
»
Version:
2.9v
cpe:2.3:a:kernel:util-linux:2.9v
Loop-Aes-Utils Project
»
Loop-Aes-Utils
»
Version:
N/A
cpe:2.3:a:loop-aes-utils_project:loop-aes-utils:-
Canonical
»
Ubuntu Linux
»
Version:
6.06
cpe:2.3:o:canonical:ubuntu_linux:6.06
Canonical
»
Ubuntu Linux
»
Version:
6.10
cpe:2.3:o:canonical:ubuntu_linux:6.10
Canonical
»
Ubuntu Linux
»
Version:
7.04
cpe:2.3:o:canonical:ubuntu_linux:7.04
Debian
»
Debian Linux
»
Version:
3.1
cpe:2.3:o:debian:debian_linux:3.1
Fedoraproject
»
Fedora
»
Version:
7
cpe:2.3:o:fedoraproject:fedora:7
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved