summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJeff Layton <jlayton@redhat.com>2009-09-25 07:05:00 -0400
committerKarolin Seeger <kseeger@samba.org>2009-10-01 14:25:01 +0200
commit6aa5d772a91b34860f4717d504d2ddcd833c730a (patch)
tree509ad6220850f9252cee098bdebad822d4bcaddc
parentba99150d3c4c4afa45cad097d6b1f4bfaaa29ba0 (diff)
downloadsamba-6aa5d772a91b34860f4717d504d2ddcd833c730a.tar.gz
samba-6aa5d772a91b34860f4717d504d2ddcd833c730a.tar.xz
samba-6aa5d772a91b34860f4717d504d2ddcd833c730a.zip
mount.cifs: check access of credential files before opening
It's possible for an unprivileged user to pass a setuid mount.cifs a credential or password file to which he does not have access. This can cause mount.cifs to open the file on his behalf and possibly leak the info in the first few lines of the file. Check the access permissions of the file before opening it. Reported-by: Ronald Volgers <r.c.volgers@student.utwente.nl> Signed-off-by: Jeff Layton <jlayton@redhat.com> Acked-by: Steve French <sfrench@us.ibm.com> Part 1/2 of a fix for CVE-2009-2948. (cherry picked from commit 87fe29ca3239492126a99e1562db673ea7ca208b)
-rw-r--r--source/client/mount.cifs.c11
1 files changed, 11 insertions, 0 deletions
diff --git a/source/client/mount.cifs.c b/source/client/mount.cifs.c
index d05115b892d..cee9188f9f9 100644
--- a/source/client/mount.cifs.c
+++ b/source/client/mount.cifs.c
@@ -199,6 +199,11 @@ static int open_cred_file(char * file_name)
char * temp_val;
FILE * fs;
int i, length;
+
+ i = access(file_name, R_OK);
+ if (i)
+ return i;
+
fs = fopen(file_name,"r");
if(fs == NULL)
return errno;
@@ -321,6 +326,12 @@ static int get_password_from_file(int file_descript, char * filename)
}
if(filename != NULL) {
+ rc = access(filename, R_OK);
+ if (rc) {
+ fprintf(stderr, "mount.cifs failed: access check of %s failed: %s\n",
+ filename, strerror(errno));
+ exit(EX_SYSERR);
+ }
file_descript = open(filename, O_RDONLY);
if(file_descript < 0) {
printf("mount.cifs failed. %s attempting to open password file %s\n",