CVE-2012-3417
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
13/08/2012
Last modified:
11/04/2025
Description
The good_client function in rquotad (rquota_svc.c) in Linux DiskQuota (aka quota) before 3.17 invokes the hosts_ctl function the first time without a host name, which might allow remote attackers to bypass TCP Wrappers rules in hosts.deny.
Impact
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:jan_kara:linux_diskquota:*:*:*:*:*:*:*:* | 3.16 (including) | |
| cpe:2.3:a:jan_kara:linux_diskquota:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre2:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre3:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre4:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre5:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre6:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre7:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre8:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.01:pre9:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:jan_kara:linux_diskquota:3.05:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba%3Dcommitdiff%3Bh%3D0abbfe92536fa5854eb65572de0cf131f80e2387
- http://rhn.redhat.com/errata/RHSA-2013-0120.html
- http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136
- http://www.openwall.com/lists/oss-security/2012/07/19/2
- http://www.openwall.com/lists/oss-security/2012/07/19/5
- https://bugzilla.redhat.com/show_bug.cgi?id=566717
- https://hermes.opensuse.org/messages/15509723
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://linuxquota.git.sourceforge.net/git/gitweb.cgi?p=linuxquota/linuxquota%3Ba%3Dcommitdiff%3Bh%3D0abbfe92536fa5854eb65572de0cf131f80e2387
- http://rhn.redhat.com/errata/RHSA-2013-0120.html
- http://sourceforge.net/tracker/?func=detail&aid=2743481&group_id=18136&atid=118136
- http://www.openwall.com/lists/oss-security/2012/07/19/2
- http://www.openwall.com/lists/oss-security/2012/07/19/5
- https://bugzilla.redhat.com/show_bug.cgi?id=566717
- https://hermes.opensuse.org/messages/15509723



