Lucene search

K
gentooGentoo FoundationGLSA-200512-14
HistoryDec 23, 2005 - 12:00 a.m.

NBD Tools: Buffer overflow in NBD server

2005-12-2300:00:00
Gentoo Foundation
security.gentoo.org
8

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.214 Low

EPSS

Percentile

96.4%

Background

The NBD Tools are the Network Block Device utilities allowing one to use remote block devices over a TCP/IP network. It includes a userland NBD server.

Description

Kurt Fitzner discovered that the NBD server allocates a request buffer that fails to take into account the size of the reply header.

Impact

A remote attacker could send a malicious request that can result in the execution of arbitrary code with the rights of the NBD server.

Workaround

There is no known workaround at this time.

Resolution

All NBD Tools users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=sys-block/nbd-2.8.2-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-block/nbd< 2.8.2-r1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.214 Low

EPSS

Percentile

96.4%