Vulnerability Name: | CVE-2005-3534 (CCN-23765) | ||||||||||||||||||||||||
Assigned: | 2005-12-21 | ||||||||||||||||||||||||
Published: | 2005-12-21 | ||||||||||||||||||||||||
Updated: | 2018-10-03 | ||||||||||||||||||||||||
Summary: | Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header. | ||||||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MISC Type: UNKNOWN http://bugs.gentoo.org/show_bug.cgi?id=116314 Source: MITRE Type: CNA CVE-2005-3534 Source: CCN Type: SA18135 Network Block Device Buffer Overflow Vulnerability Source: SECUNIA Type: Vendor Advisory 18135 Source: SECUNIA Type: Patch, Vendor Advisory 18171 Source: SECUNIA Type: Patch, Vendor Advisory 18209 Source: SECUNIA Type: Patch, Vendor Advisory 18315 Source: SECUNIA Type: Vendor Advisory 18503 Source: SECUNIA Type: UNKNOWN 43353 Source: SECUNIA Type: UNKNOWN 43610 Source: MISC Type: UNKNOWN http://sourceforge.net/mailarchive/forum.php?thread_id=9201144&forum_id=40388 Source: CONFIRM Type: Patch http://sourceforge.net/project/shownotes.php?release_id=380202&group_id=13229 Source: CONFIRM Type: Patch http://sourceforge.net/project/shownotes.php?release_id=380210&group_id=13229 Source: DEBIAN Type: Patch, Vendor Advisory DSA-924 Source: DEBIAN Type: DSA-924 nbd -- buffer overflow Source: CCN Type: GLSA-200512-14 NBD Tools: Buffer overflow in NBD server Source: GENTOO Type: Patch, Vendor Advisory GLSA-200512-14 Source: OSVDB Type: Patch 21848 Source: CCN Type: OSVDB ID: 21848 Network Block Device (NBD) Server Request Handling Remote Overflow Source: CCN Type: OSVDB ID: 73463 Network Block Device nbd-server.c mainloop Function Remote Overflow Source: BID Type: Patch 16029 Source: CCN Type: BID-16029 Network Block Device Server Buffer Overflow Vulnerability Source: CCN Type: USN-237-1 nbd vulnerability Source: XF Type: UNKNOWN nbd-bo(23765) Source: UBUNTU Type: UNKNOWN USN-237-1 Source: SUSE Type: SUSE-SR:2006:001 SUSE Security Summary Report | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |