Korean
<< Back
VID 17067
Severity 40
Port 111
Protocol TCP,UDP
Class RPC
Detailed Description A directory on a NFS exported file system is identified as an writable user home. Using NFS, this situation allows an attacker to gain access to the system by modifying certain files.

* Note: This check searches for an writable directory and reports if it finds these files: .login, .profile, .rhosts, .cshrc, .netrc. These files typically appear in an account's home directory.

* Platforms Affected:
NFS Any version

* References:
http://www.iss.net/security_center/static/81.php
http://www.cert.org/advisories/CA-1994-15.html
http://www.cerias.purdue.edu/coast/satan-html/tutorials/vulnerability/unrestricted_NFS_export.html
Recommendation Wherever possible, export the directory as read-only, or reconfigure to only export to trusted hosts through proper NFS export lists. For more information, see the manual pages on your UNIX machine.

* References related to setting up a NFS server:
http://www.ebsinc.com/solaris/network/nfs.html
http://www.redhat.com/mirrors/LDP/HOWTO/NFS-HOWTO/index.html
http://nfs.sourceforge.net/nfs-howto/server.html
http://www.linuxsecurity.com/feature_stories/feature_story-118.html
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)