The remote host is missing an update for the 'nfs-utils' package(s) announced via the referenced advisory. A flaw was found in the way nfs-utils performed IP based authentication of mount requests, and mount.nfs tool did not handle certain errors when updating the mtab file. Several bugs are fixed and an enhancement is added
Reporter | Title | Published | Views | Family All 44 |
---|---|---|---|---|
![]() | nfs-utils security, bug fix, and enhancement update | 14 Dec 201100:00 | – | oraclelinux |
![]() | nfs-utils security, bug fix, and enhancement update | 1 Mar 201200:00 | – | oraclelinux |
![]() | openSUSE Security Update : nfs-client (openSUSE-SU-2011:0747-1) | 13 Jun 201400:00 | – | nessus |
![]() | RHEL 6 : nfs-utils (RHSA-2011:1534) | 6 Dec 201100:00 | – | nessus |
![]() | Oracle Linux 6 : nfs-utils (ELSA-2011-1534) | 7 Sep 202300:00 | – | nessus |
![]() | Scientific Linux Security Update : nfs-utils on SL6.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | Fedora 15 : nfs-utils-1.2.4-0.fc15 (2011-8934) | 7 Jul 201100:00 | – | nessus |
![]() | SuSE 11.1 Security Update : NFS (SAT Patch Number 4821) | 11 Jul 201100:00 | – | nessus |
![]() | RHEL 5 : nfs-utils (RHSA-2012:0310) | 21 Feb 201200:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : nfs-utils (MDVSA-2011:186) | 13 Dec 201100:00 | – | nessus |
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2011-December/msg00009.html");
script_oid("1.3.6.1.4.1.25623.1.0.870655");
script_version("2024-03-21T05:06:54+0000");
script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
script_tag(name:"creation_date", value:"2012-07-09 10:44:04 +0530 (Mon, 09 Jul 2012)");
script_cve_id("CVE-2011-1749", "CVE-2011-2500");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_xref(name:"RHSA", value:"2011:1534-03");
script_name("RedHat Update for nfs-utils RHSA-2011:1534-03");
script_tag(name:"summary", value:"The remote host is missing an update for the 'nfs-utils'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 Greenbone AG");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_6");
script_tag(name:"affected", value:"nfs-utils on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_tag(name:"insight", value:"The nfs-utils packages provide a daemon for the kernel Network File System
(NFS) server, and related tools such as the mount.nfs, umount.nfs, and
showmount programs.
A flaw was found in the way nfs-utils performed IP based authentication of
mount requests. In configurations where a directory was exported to a group
of systems using a DNS wildcard or NIS (Network Information Service)
netgroup, an attacker could possibly gain access to other directories
exported to a specific host or subnet, bypassing intended access
restrictions. (CVE-2011-2500)
It was found that the mount.nfs tool did not handle certain errors
correctly when updating the mtab (mounted file systems table) file. A local
attacker could use this flaw to corrupt the mtab file. (CVE-2011-1749)
This update also fixes several bugs and adds an enhancement. Documentation
for these bug fixes and the enhancement will be available shortly from the
Technical Notes document, linked to in the References section.
Users of nfs-utils are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues and add this
enhancement. After installing this update, the nfs service will be
restarted automatically.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"nfs-utils", rpm:"nfs-utils~1.2.3~15.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"nfs-utils-debuginfo", rpm:"nfs-utils-debuginfo~1.2.3~15.el6", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo