Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-014: nfs


Vulnerability Assessment Details

RHSA-2005-014: nfs

Vulnerability Assessment Summary
Check for the version of the nfs packages

Detailed Explanation for this Vulnerability Assessment


An updated nfs-utils package that fixes various security issues is now
available.

The nfs-utils package provides a daemon for the kernel NFS server and
related tools.

SGI reported that the statd daemon did not properly handle the SIGPIPE
signal. A misconfigured or malicious peer could cause statd to crash,
leading to a denial of service. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-1014 to this issue.

Arjan van de Ven discovered a buffer overflow in rquotad. On 64-bit
architectures, an improper integer conversion can lead to a buffer
overflow. A possible hacker with access to an NFS share could send a specially
crafted request which could lead to the execution of arbitrary code. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-0946 to this issue.

All users of nfs-utils should upgrade to this updated package, which
resolves these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-014.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Dell R730xd PowerEdge 24 Bay 768GB RAM 24x 500GB 2 x E5-2643v3 3.40 GHz H730
$18334.0
Dell R730xd PowerEdge 24 Bay 768GB RAM 24x 500GB 2 x E5-2643v3 3.40 GHz H730 pictureDell R730xd PowerEdge 24 Bay 64GB RAM 22x 300GB 2 x E5-2687Wv4 3.00 GHz H730
$11297.0
Dell R730xd PowerEdge 24 Bay 64GB RAM 22x 300GB 2 x E5-2687Wv4 3.00 GHz H730 pictureDell R730xd PowerEdge 24 Bay 2 x E5-2623v3 3.00 GHz 768GB RAM 2x 1.2TB H730p
$13108.0
Dell R730xd PowerEdge 24 Bay 2 x E5-2623v3 3.00 GHz 768GB RAM 2x 1.2TB H730p pictureDell R730xd PowerEdge 24 Bay 2 x E5-2697v4 2.30 GHz 8GB RAM 10x 500GB H330
$9530.0
Dell R730xd PowerEdge 24 Bay 2 x E5-2697v4 2.30 GHz 8GB RAM 10x 500GB H330 picture


Discussions

No Discussions have been posted on this vulnerability.