search menu icon-carat-right cmu-wordmark

CERT Coordination Center

nfs-utils vulnerable to buffer overflow in "getquotainfo()" in "rquota_server.c"

Vulnerability Note VU#698302

Original Release Date: 2005-03-04 | Last Revised: 2005-04-04

Overview

A vulnerability in nfs-utils could permit an attacker to execute arbitrary code on the system or cause a denial of service.

Description

The NFS protocol provides remote access to shared files accross networks. The nfs-utils package provides an NFS client and server for Linux systems. Nfs-utils on 64-bit architecture machines contains a stack-based buffer overflow vulnerability. The function "getquotainfo()" in "rquota_server.c" assumes certain values to be 32-bit in size during a call to memcpy(). On a 64-bit machine, this can cause a buffer overflow.

Impact

A remote attacker could execute arbitrary code or create a denial-of-service condition on a vulnerable server running nfs-utils.

Solution

Apply a patch from your vendor

For vendor-specific information regarding vulnerable status and patch availability, please see the vendor section of this document.

Vendor Information

698302
 

View all 19 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Red Hat credits Arjan van de Ven with reporting this vulnerability.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2004-0946
Severity Metric: 7.48
Date Public: 2004-11-22
Date First Published: 2005-03-04
Date Last Updated: 2005-04-04 14:36 UTC
Document Revision: 10

Sponsored by CISA.