Description


In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.

Related CPE's



o

debian

debian_linux

2

o

fedoraproject

fedora

3

References




https://lists.debian.org/nbd/2022/01/msg00037.html

ExploitMailing ListThird Party Advisory





https://sourceforge.net/projects/nbd/files/nbd/

ProductRelease NotesThird Party Advisory




https://lists.debian.org/nbd/2022/01/msg00037.html

ExploitMailing ListThird Party Advisory





https://sourceforge.net/projects/nbd/files/nbd/

ProductRelease NotesThird Party Advisory

Weaknesses



CWE-787

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 · Critical

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2022-03-06T05:15:07.357Z

3 years ago

Last modified

2024-11-21T05:54:03.520Z

1 year ago