Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2010-0789
fusermount in FUSE before 2.7.5, and 2.8.x before 2.8.2, allows local users to unmount an arbitrary FUSE filesystem share via a symlink attack on a mountpoint.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.0
EPSS Ranking
7.8%
CVSS Severity
CVSS v2 Score
3.3
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567633
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034518.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034580.html
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://secunia.com/advisories/38261
http://secunia.com/advisories/38287
http://secunia.com/advisories/38359
http://secunia.com/advisories/38437
http://sourceforge.net/projects/fuse/files/ReleaseNotes/fuse-2.8.3.html/view
http://sourceforge.net/projects/fuse/files/fuse-2.X/2.7.5/fuse-2.7.5.tar.gz/download
http://www.debian.org/security/2010/dsa-1989
http://www.securityfocus.com/bid/37983
http://www.ubuntu.com/usn/USN-892-1
http://www.vupen.com/english/advisories/2010/1107
https://bugzilla.redhat.com/show_bug.cgi?id=532940
https://bugzilla.redhat.com/show_bug.cgi?id=558833
https://exchange.xforce.ibmcloud.com/vulnerabilities/55945
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567633
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034518.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-February/034580.html
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
http://secunia.com/advisories/38261
http://secunia.com/advisories/38287
http://secunia.com/advisories/38359
http://secunia.com/advisories/38437
http://sourceforge.net/projects/fuse/files/ReleaseNotes/fuse-2.8.3.html/view
http://sourceforge.net/projects/fuse/files/fuse-2.X/2.7.5/fuse-2.7.5.tar.gz/download
http://www.debian.org/security/2010/dsa-1989
http://www.securityfocus.com/bid/37983
http://www.ubuntu.com/usn/USN-892-1
http://www.vupen.com/english/advisories/2010/1107
https://bugzilla.redhat.com/show_bug.cgi?id=532940
https://bugzilla.redhat.com/show_bug.cgi?id=558833
https://exchange.xforce.ibmcloud.com/vulnerabilities/55945
Products affected by CVE-2010-0789
Fuse
»
Fuse
»
Version:
1.9
cpe:2.3:a:fuse:fuse:1.9
Fuse
»
Fuse
»
Version:
2.0
cpe:2.3:a:fuse:fuse:2.0
Fuse
»
Fuse
»
Version:
2.1
cpe:2.3:a:fuse:fuse:2.1
Fuse
»
Fuse
»
Version:
2.2
cpe:2.3:a:fuse:fuse:2.2
Fuse
»
Fuse
»
Version:
2.2.1
cpe:2.3:a:fuse:fuse:2.2.1
Fuse
»
Fuse
»
Version:
2.3
cpe:2.3:a:fuse:fuse:2.3
Fuse
»
Fuse
»
Version:
2.3.0
cpe:2.3:a:fuse:fuse:2.3.0
Fuse
»
Fuse
»
Version:
2.4.0
cpe:2.3:a:fuse:fuse:2.4.0
Fuse
»
Fuse
»
Version:
2.4.1
cpe:2.3:a:fuse:fuse:2.4.1
Fuse
»
Fuse
»
Version:
2.4.2
cpe:2.3:a:fuse:fuse:2.4.2
Fuse
»
Fuse
»
Version:
2.5.0
cpe:2.3:a:fuse:fuse:2.5.0
Fuse
»
Fuse
»
Version:
2.5.1
cpe:2.3:a:fuse:fuse:2.5.1
Fuse
»
Fuse
»
Version:
2.5.2
cpe:2.3:a:fuse:fuse:2.5.2
Fuse
»
Fuse
»
Version:
2.5.3
cpe:2.3:a:fuse:fuse:2.5.3
Fuse
»
Fuse
»
Version:
2.6.0
cpe:2.3:a:fuse:fuse:2.6.0
Fuse
»
Fuse
»
Version:
2.6.1
cpe:2.3:a:fuse:fuse:2.6.1
Fuse
»
Fuse
»
Version:
2.6.3
cpe:2.3:a:fuse:fuse:2.6.3
Fuse
»
Fuse
»
Version:
2.6.5
cpe:2.3:a:fuse:fuse:2.6.5
Fuse
»
Fuse
»
Version:
2.7.0
cpe:2.3:a:fuse:fuse:2.7.0
Fuse
»
Fuse
»
Version:
2.7.1
cpe:2.3:a:fuse:fuse:2.7.1
Fuse
»
Fuse
»
Version:
2.7.2
cpe:2.3:a:fuse:fuse:2.7.2
Fuse
»
Fuse
»
Version:
2.7.3
cpe:2.3:a:fuse:fuse:2.7.3
Fuse
»
Fuse
»
Version:
2.7.4
cpe:2.3:a:fuse:fuse:2.7.4
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved