| VID |
17067 |
| Severity |
40 |
| Port |
111 |
| Protocol |
TCP,UDP |
| Class |
RPC |
| Detailed Description |
A directory on a NFS exported file system is identified as an writable user home. Using NFS, this situation allows an attacker to gain access to the system by modifying certain files.
* Note: This check searches for an writable directory and reports if it finds these files: .login, .profile, .rhosts, .cshrc, .netrc. These files typically appear in an account's home directory.
* Platforms Affected: NFS Any version
* References: http://www.iss.net/security_center/static/81.php http://www.cert.org/advisories/CA-1994-15.html http://www.cerias.purdue.edu/coast/satan-html/tutorials/vulnerability/unrestricted_NFS_export.html |
| Recommendation |
Wherever possible, export the directory as read-only, or reconfigure to only export to trusted hosts through proper NFS export lists. For more information, see the manual pages on your UNIX machine.
* References related to setting up a NFS server: http://www.ebsinc.com/solaris/network/nfs.html http://www.redhat.com/mirrors/LDP/HOWTO/NFS-HOWTO/index.html http://nfs.sourceforge.net/nfs-howto/server.html http://www.linuxsecurity.com/feature_stories/feature_story-118.html |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|