CVE-2008-4552
nfs-utils: incorrect use of tcp_wrappers, causing hostname-based rules to be ignored
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The good_client function in nfs-utils 1.0.9, and possibly other versions before 1.1.3, invokes the hosts_ctl function with the wrong order of arguments, which causes TCP Wrappers to ignore netgroups and allows remote attackers to bypass intended access restrictions.
La función good_client en nfs-utils versión 1.0.9, y posiblemente otras versiones anteriores a 1.1.3, invoca la función hosts_ctl con el orden incorrecto de argumentos, lo que causa que la TCP Wrappers ignore los netgroups y permita a los atacantes remotos omitir las restricciones de acceso previstas.
A security vulnerability has been identified and fixed in nfs-utils, which caused TCP Wrappers to ignore netgroups and allows remote attackers to bypass intended access restrictions. The updated packages have been patched to prevent this. The Corporate Server 4 packages had the wrong release number (lower than before) which prevented the update packages from being installed automatically. This problem has now been solved with new packages with the correct release number.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-10-14 CVE Reserved
- 2008-10-14 CVE Published
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://lists.vmware.com/pipermail/security-announce/2010/000082.html | Mailing List | |
http://secunia.com/advisories/36538 | Third Party Advisory | |
http://wiki.rpath.com/Advisories:rPSA-2008-0307 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2012/07/19/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2012/07/19/5 | Mailing List |
|
http://www.securityfocus.com/archive/1/497935/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45895 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11544 | Signature | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8325 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/31823 | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/32346 | 2018-10-11 | |
http://secunia.com/advisories/32481 | 2018-10-11 | |
http://secunia.com/advisories/33006 | 2018-10-11 | |
http://secunia.com/advisories/38794 | 2018-10-11 | |
http://secunia.com/advisories/38833 | 2018-10-11 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:060 | 2018-10-11 | |
http://www.redhat.com/support/errata/RHSA-2009-1321.html | 2018-10-11 | |
http://www.ubuntu.com/usn/USN-687-1 | 2018-10-11 | |
http://www.vupen.com/english/advisories/2010/0528 | 2018-10-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=458676 | 2009-09-02 | |
https://access.redhat.com/security/cve/CVE-2008-4552 | 2009-09-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | <= 1.1.2 Search vendor "Nfs" for product "Nfs-utils" and version " <= 1.1.2" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 0.2 Search vendor "Nfs" for product "Nfs-utils" and version "0.2" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 0.2.1 Search vendor "Nfs" for product "Nfs-utils" and version "0.2.1" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 0.3.1 Search vendor "Nfs" for product "Nfs-utils" and version "0.3.1" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 0.3.3 Search vendor "Nfs" for product "Nfs-utils" and version "0.3.3" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0 Search vendor "Nfs" for product "Nfs-utils" and version "1.0" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.1 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.1" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.2 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.2" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.3 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.3" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.4 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.4" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.6 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.6" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.7 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.7" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.7 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.7" | pre-1 |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.7 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.7" | pre-2 |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.8 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.8" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.8 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.8" | rc-1 |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.8 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.8" | rc-2 |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.8 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.8" | rc-3 |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.8 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.8" | rc-4 |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.9 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.9" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.10 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.10" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.11 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.11" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.0.12 Search vendor "Nfs" for product "Nfs-utils" and version "1.0.12" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.1.0 Search vendor "Nfs" for product "Nfs-utils" and version "1.1.0" | - |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.1.0 Search vendor "Nfs" for product "Nfs-utils" and version "1.1.0" | rc-1 |
Affected
| ||||||
Nfs Search vendor "Nfs" | Nfs-utils Search vendor "Nfs" for product "Nfs-utils" | 1.1.1 Search vendor "Nfs" for product "Nfs-utils" and version "1.1.1" | - |
Affected
|