Description
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
Related CPE's
o
debian
debian_linux
o
fedoraproject
fedora
References
https://lists.debian.org/nbd/2022/01/msg00036.html
https://lists.debian.org/nbd/2022/01/msg00037.html
https://sourceforge.net/projects/nbd/files/nbd/
https://www.debian.org/security/2022/dsa-5100
https://lists.debian.org/nbd/2022/01/msg00036.html
https://lists.debian.org/nbd/2022/01/msg00037.html
https://sourceforge.net/projects/nbd/files/nbd/
https://www.debian.org/security/2022/dsa-5100
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-06T05:15:07.357Z
3 years agoLast modified
2024-11-21T05:54:03.520Z
1 year ago