5 results (0.021 seconds)

CVSS: 7.8EPSS: 2%CPEs: 5EXPL: 0

nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors. nbd-server.c en Network Block Device (nbd-server) anterior a 3.11 no maneja correctamente los señales, lo que permite a atacantes remotos causar una denegación de servicio (bloqueo) a través de vectores no especificados. • http://lists.opensuse.org/opensuse-updates/2015-06/msg00003.html http://sourceforge.net/p/nbd/mailman/message/34091218 http://sourceforge.net/projects/nbd/files/nbd/3.11 http://www.debian.org/security/2015/dsa-3271 http://www.openwall.com/lists/oss-security/2015/05/07/9 http://www.ubuntu.com/usn/USN-2676-1 • CWE-17: DEPRECATED: Code •

CVSS: 7.5EPSS: 1%CPEs: 45EXPL: 0

nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file. nbd-server en Network Block Device (nbd) anteriores a 3.5 no comprueba correctamente direcciones IP, lo cual podría permitir a atacantes remotos sortear restricciones de acceso intencionadas a través de una dirección IP con una coincidencia parcial en el fichero de configuración authfile. • http://sourceforge.net/mailarchive/forum.php?thread_name=529BAA58.2080401%40uter.be&forum_name=nbd-general http://www.debian.org/security/2013/dsa-2806 http://www.openwall.com/lists/oss-security/2013/11/29/4 http://www.securityfocus.com/bid/64002 http://www.ubuntu.com/usn/USN-2676-1 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

nbd-server.c in Network Block Device (nbd-server) 2.9.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by causing a negotiation failure, as demonstrated by specifying a name for a non-existent export. nbd-server.c en Network Block Device (nbd-server) v2.9.21 permite a atacantes remotos provocar una denegación de servicio (desreferencia de puntero NULL y caída), causando un fallo de negociación, como se demuestra especificando un nombre para una exportación inexistente. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627042. http://nbd.git.sourceforge.net/git/gitweb.cgi?p=nbd/nbd%3Ba=commitdiff%3Bh=ebbbe0b3ce5393fa42a259f5e03d549508586aaa http://security.gentoo.org/glsa/glsa-201206-35.xml http://www.openwall.com/lists/oss-security/2011/05/17/1 http://www.securityfocus.com/bid/47884 https://exchange.xforce.ibmcloud.com/vulnerabilities/67502 •

CVSS: 7.5EPSS: 26%CPEs: 20EXPL: 0

Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression. Desbordamiento de búfer en la función mainloop en NBD-server.c en Network Block Device (nbd) antes de v2.9.20 podría permitir a atacantes remotos ejecutar código de su elección a través de una solicitud extensa. NOTA: este problema existe debido a una regresión CVE-2005-3534. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187 http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html http://openwall.com/lists/oss-security/2011/01/28/3 http://openwall.com/lists/oss-security/2011/01/31/7 http://secunia.com/advisories/43353 http://secunia.com/advisories/43610 http://sec • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 21%CPEs: 3EXPL: 0

Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header. • http://bugs.gentoo.org/show_bug.cgi?id=116314 http://secunia.com/advisories/18135 http://secunia.com/advisories/18171 http://secunia.com/advisories/18209 http://secunia.com/advisories/18315 http://secunia.com/advisories/18503 http://secunia.com/advisories/43353 http://secunia.com/advisories/43610 http://sourceforge.net/mailarchive/forum.php?thread_id=9201144&forum_id=40388 http://sourceforge.net/project/shownotes.php?release_id=380202&group_id=13229 http://sourceforge.net/project&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •