Family: Red Hat Local Security Checks --> Category: infos
RHSA-2005-014: nfs Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the nfs packages
Detailed Explanation for this Vulnerability Test
An updated nfs-utils package that fixes various security issues is now
The nfs-utils package provides a daemon for the kernel NFS server and
SGI reported that the statd daemon did not properly handle the SIGPIPE
signal. A misconfigured or malicious peer could cause statd to crash,
leading to a denial of service. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-1014 to this issue.
Arjan van de Ven discovered a buffer overflow in rquotad. On 64-bit
architectures, an improper integer conversion can lead to a buffer
overflow. A possible hacker with access to an NFS share could send a specially
crafted request which could lead to the execution of arbitrary code. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-0946 to this issue.
All users of nfs-utils should upgrade to this updated package, which
resolves these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2005-014.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.