| VID |
12045 |
| Severity |
40 |
| Port |
|
| Protocol |
UDP |
| Class |
RPC |
| Detailed Description |
The rpc.mountd daemon is vulnerable to an off-by-one overflow attack. Linux NFS utils package, nfs-utils is a freely available NFS (Network File System) utility for Linux based-operating systems. nfs-utils versions before 1.0.4 are vulnerable to a buffer overflow, caused by an off-by-one error in the xlog function of mountd which handles logging of requests.. It is possible to exploit this issue via mountd. A remote or local attacker could send a specially-crafted RPC (Remote Procedure Call) request to the rpc.mountd daemon to overflow a buffer and cause the daemon to crash. There is a possibility that this issue could be exploited to run arbitrary code in the context of mountd, which runs as root.
* Note: The rpc.mountd daemon will have been crashed by a this check. Therefore restarting the rpc.mountd service is required in order to regain normal functionality.
* References: http://www.securityfocus.com/archive/1/328946 http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0023.html http://marc.theaimsgroup.com/?l=bugtraq&m=105820223707191&w=2 http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0024.html
* Platforms Affected: Linux NFS utils package (nfs-utils) before 1.0.4 Linux Any version |
| Recommendation |
Upgrade to the latest version of nfs-utils (1.0.4 or later), available from the Linux NFS development web site at http://sourceforge.net/projects/nfs/
For Red Hat Linux: Upgrade to the latest nfs-utils package, as listed in Red Hat Linux Security Advisory RHSA-2003:206-05 at http://rhn.redhat.com/errata/RHSA-2003-206.html
For Debian GNU/Linux 3.0 (alias woody): Upgrade to the latest nfs-utils package (nfs-utils_1.0-2woody1 or later), as listed in Debian Security Advisory DSA 349-1 at http://archives.neohapsis.com/archives/bugtraq/2003-07/0169.html
For SuSE Linux: Upgrade to the latest nfs-utils package, as listed in SuSE Security Announcement SuSE-SA:2003:031 at http://www.suse.de/de/security/2003_031_nfs_utils.html
For Slackware Linux 8.1 and 9.0: Upgrade to the latest nfs-utils package (1.0.4 or later), as listed in Slackware Security Advisory SSA:2003-195-01b at http://www.slackware.com/security/viewer.php?l=slackware-security&y=2003&m=slackware-security.374504
For Turbolinux: Upgrade to the latest version of nfs-utils, as listed in Turbolinux Security Advisory TLSA-2003-44 at http://www.securityfocus.com/advisories/5629
For Gentoo Linux: Upgrade to the latest version of nfs-utils (1.0.5 or later), as listed in Gentoo Linux Security Announcement 200307-07 at http://www.linuxsecurity.com/advisories/gentoo_advisory-3476.html
For Trustix Secure Linux: Upgrade to the latest nfs-utils package, as listed in Trustix Secure Linux Security Advisory #2003-0027 at http://www.linuxsecurity.com/advisories/trustix_advisory-3472.html
For Conectiva Linux: Upgrade to the latest nfs-utils package, as listed in Conectiva Linux Security Announcement CLSA-2003:700 at http://distro.conectiva.com/atualizacoes/index.php?id=a&anuncio=000700
For Immunix Secured OS 7+: Upgrade to the latest version of nfs-utils (0.3.1-7_imnx_3 or later), as listed in Immunix Secured OS Security Advisory IMNX-2003-7+-018-01 at http://www.linuxsecurity.com/advisories/immunix_advisory-3466.html
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2003-0252 (CVE) |
| Related URL |
8179 (SecurityFocus) |
| Related URL |
12600 (ISS) |
|