Description
In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.
Related CPE's
o
debian
debian_linux
2
o
fedoraproject
fedora
3
References
https://lists.debian.org/nbd/2022/01/msg00036.html
Mailing ListThird Party Advisory
https://lists.debian.org/nbd/2022/01/msg00037.html
ExploitMailing ListThird Party Advisory
https://sourceforge.net/projects/nbd/files/nbd/
ProductRelease NotesThird Party Advisory
https://www.debian.org/security/2022/dsa-5100
Third Party Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
CVSS V3.1
CVSS V3.0
CVSS V2.0
Information
Source identifier
Vulnerability status
Modified
Published
2022-03-06T06:15:07.357
3 years agoLast modified
2024-02-04T11:15:09.087
1 year ago