[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2005-3534

Date: (C)2005-12-22   (M)2015-12-16
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header.

Reference:
BID-16029
SECUNIA-18135
SECUNIA-18171
SECUNIA-18209
SECUNIA-18315
SECUNIA-18503
OSVDB-21848
SECUNIA-43353
SECUNIA-43610
DSA-924
GLSA-200512-14
USN-237-1
http://bugs.gentoo.org/show_bug.cgi?id=116314
http://sourceforge.net/mailarchive/forum.php?thread_id=9201144&forum_id=40388
http://sourceforge.net/project/shownotes.php?release_id=380202&group_id=13229
http://sourceforge.net/project/shownotes.php?release_id=380210&group_id=13229

CPE    3
cpe:/a:wouter_verhelst:nbd:2.7.5
cpe:/a:wouter_verhelst:nbd:2.8.0
cpe:/a:wouter_verhelst:nbd:2.8.2
CWE    1
CWE-119
OVAL    3
oval:org.secpod.oval:def:600177
oval:org.secpod.oval:def:101222
oval:org.secpod.oval:def:101220

© 2013 SecPod Technologies