[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2005-3534Date: (C)2005-12-22   (M)2023-12-22


Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-16029
SECUNIA-18135
SECUNIA-18171
SECUNIA-18209
SECUNIA-18315
SECUNIA-18503
OSVDB-21848
SECUNIA-43353
SECUNIA-43610
DSA-924
GLSA-200512-14
USN-237-1
http://bugs.gentoo.org/show_bug.cgi?id=116314
http://sourceforge.net/mailarchive/forum.php?thread_id=9201144&forum_id=40388
http://sourceforge.net/project/shownotes.php?release_id=380202&group_id=13229
http://sourceforge.net/project/shownotes.php?release_id=380210&group_id=13229

CPE    3
cpe:/a:wouter_verhelst:nbd
cpe:/a:wouter_verhelst:nbd:2.8.0
cpe:/a:wouter_verhelst:nbd:2.8.2
CWE    1
CWE-119
OVAL    3
oval:org.secpod.oval:def:101222
oval:org.secpod.oval:def:101220
oval:org.secpod.oval:def:600177

© SecPod Technologies