Lucene search

K
certCERTVU:578105
HistoryJun 27, 2007 - 12:00 a.m.

Novell NetWare NFS denial of service vulnerability

2007-06-2700:00:00
www.kb.cert.org
17

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.108 Low

EPSS

Percentile

95.1%

Overview

The Novell NetWare NFS mount daemon contains a denial of service vulnerability.

Description

Network File System (NFS) is an ONC RPC based file and print sharing protocol. Novell Netware includes support for the NFS protocol.

From Novell Support Document 3008097:

_If an NFS client attempts a mount command against a NetWare 6.5 NFS server, and the path component of the command exceeds 508 characters, the XNFS.NLM on the NetWare server will abend, in an rpcWorkerThread. This can happen anytime XNFS.NLM is loaded, even if there is not any path currently exported.

This makes the NetWare server vulnerable to denial-of-service attack, anytime XNFS.NLM is loaded.

This vulnerability is not necessarily limited to NetWare 6.5 SP6. Older support packs are likely vulnerable as well._


Impact

A remote, unauthenticated attacker may be able to create a denial of service condition.


Solution

Update

Novell has released an update to address this issue. See Novell support document 5004900 for details about patch availability.


Restrict access
Restriciting network access to NFS servers and clients may mitigate this vulnerability.


Vendor Information

578105

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Novell, Inc. __ Affected

Updated: June 27, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

See <https://secure-support.novell.com/KanisaPlatform/Publishing/23/3008097_f.SAL_Public.html&gt; for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23578105 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Novell for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-3207
Severity Metric: 3.28 Date Public:

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.108 Low

EPSS

Percentile

95.1%

Related for VU:578105