Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-014: nfs


Vulnerability Assessment Details

RHSA-2005-014: nfs

Vulnerability Assessment Summary
Check for the version of the nfs packages

Detailed Explanation for this Vulnerability Assessment


An updated nfs-utils package that fixes various security issues is now
available.

The nfs-utils package provides a daemon for the kernel NFS server and
related tools.

SGI reported that the statd daemon did not properly handle the SIGPIPE
signal. A misconfigured or malicious peer could cause statd to crash,
leading to a denial of service. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-1014 to this issue.

Arjan van de Ven discovered a buffer overflow in rquotad. On 64-bit
architectures, an improper integer conversion can lead to a buffer
overflow. A possible hacker with access to an NFS share could send a specially
crafted request which could lead to the execution of arbitrary code. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-0946 to this issue.

All users of nfs-utils should upgrade to this updated package, which
resolves these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-014.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors


AMD EPYC 7282 CPU Processor 16 Cores 32 Threads 2.8GHZ up to 3.2GHZ 120W no lock picture

AMD EPYC 7282 CPU Processor 16 Cores 32 Threads 2.8GHZ up to 3.2GHZ 120W no lock

$76.00



Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc... picture

Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc...

$419.99



Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc... picture

Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...

$619.99



Intel Core i7-6700 3.40 GHz QUAD Core (4 Core) Desktop Processor 8MB LGA 1151 picture

Intel Core i7-6700 3.40 GHz QUAD Core (4 Core) Desktop Processor 8MB LGA 1151

$59.99



Intel Core i7-14700K Unlocked Desktop Processor picture

Intel Core i7-14700K Unlocked Desktop Processor

$409.99



Intel Core i5-12600KF Desktop Processor 10 (6P+4E) Cores up to 4.9 GHz Unlocked. picture

Intel Core i5-12600KF Desktop Processor 10 (6P+4E) Cores up to 4.9 GHz Unlocked.

$145.59



Intel Core i5-6500 3.2GHz 6MB SR2L6 / SR2BX Skt. FCLGA1151 Desktop Processor CPU picture

Intel Core i5-6500 3.2GHz 6MB SR2L6 / SR2BX Skt. FCLGA1151 Desktop Processor CPU

$24.50



AMD Ryzen 5 4500 6-Core 3.6GHz Socket AM4 65W CPU Desktop Processor picture

AMD Ryzen 5 4500 6-Core 3.6GHz Socket AM4 65W CPU Desktop Processor

$79.00



Intel Core i7-13700K 3.40GHz 16-Core CPU LGA1700 BX8071513700K picture

Intel Core i7-13700K 3.40GHz 16-Core CPU LGA1700 BX8071513700K

$339.99



AMD EPYC 7282 cpu processor 16 cores 32 threads 2.8GHZ up to 3.2GHZ 120w picture

AMD EPYC 7282 cpu processor 16 cores 32 threads 2.8GHZ up to 3.2GHZ 120w

$78.00



Discussions

No Discussions have been posted on this vulnerability.