Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2011-1749
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The nfs_addmntent function in support/nfs/nfs_mntent.c in the mount.nsf tool in nfs-utils before 1.2.4 attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to corrupt this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
nfs-utils 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
nfs-utils是一套Linux内核中的NFS(网络文件系统)的支持程序。 nfs-utils 1.2.4之前的版本的mount.nsf工具中的support/nfs/nfs_mntent.c文件中的‘nfs_addmntent’函数存在安全漏洞,该漏洞源于程序向/etc/mtab文件添加资源时没有进行检查。本地攻击者可借助小的‘RLIMIT_FSIZE’值利用该漏洞损坏/etc/mtab文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2011-1749
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2011-1749
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2011-1749

No comments yet


Leave a comment