Korean
<< Back
VID 17061
Severity 40
Port 111
Protocol TCP,UDP
Class RPC
Detailed Description On some older mount daemons if the export list of hosts within /etc/exports is over 256 character long, it will allow anyone to mount your NFS shared directories regardless of whether they are in the exports list or not.
This allows remote attackers to mount the file system of the vulnerable host without authorization.

* Note: This check sees if your export list is over 256 character long, and attempts to mount those file systems.

* Platforms Affected:
NFS Old Versions

References:
CERT Advisory CA-91:21.SunOS.NFS.Jumbo.and.fsirand
ftp://ftp.cert.org/pub/cert_advisories/CA-91:21.SunOS.NFS.Jumbo.and.fsirand
CERT Advisory CA-92:15.Multiple.SunOS.vulnerabilities.patched
ftp://ftp.cert.org/pub/cert_advisories/CA-92:15.Multiple.SunOS.vulnerabilities.patched
CERT Advisory CA-93:15.SunOS.and.Solaris.vulnerabilities
ftp://ftp.cert.org/pub/cert_advisories/CA-93:15.SunOS.and.Solaris.vulnerabilities
CERT Advisory CA-94:02.REVISED.SunOS.rpc.mountd.vulnerability
ftp://ftp.cert.org/pub/cert_advisories/CA-94:02.REVISED.SunOS.rpc.mountd.vulnerability
CERT Advisory CA-94:15.NFS.Vulnerabilities
ftp://ftp.cert.org/pub/cert_advisories/CA-94:15.NFS.Vulnerabilities

http://online.securityfocus.com/bid/24
http://www.cert.org/advisories/CA-1994-02.html
Recommendation Upgrade to the latest version of the NFS server, available from your vendor. Contact your vendor or refer to your operating system documentation for more information.

For Sun systems:
Apply the NFS patch (Patch-ID# 100296-04), available from the Sun Microsystems Web site, http://sunsolve.sun.com/
Related URL CVE-1999-0211 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)