The scenario here is a local attacker abusing some script routine where he/she can manipulate part of the parameters when calling cryptmount. To exploit this the attacker can craft special formatted argument line when calling cryptmount.
I understand as a medium/low impact since it requires local access to the system.
The scenario here is a local attacker abusing some script routine where he/she can manipulate part of the parameters when calling cryptmount. To exploit this the attacker can craft special formatted argument line when calling cryptmount.
I understand as a medium/low impact since it requires local access to the system.