CVE-2004-1014

statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.
Configurations

Configuration 1 (hide)

cpe:2.3:a:nfs:nfs-utils:1.0.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&view=markup - () http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&view=markup -
References () http://www.debian.org/security/2004/dsa-606 - () http://www.debian.org/security/2004/dsa-606 -
References () http://www.redhat.com/support/errata/RHSA-2004-583.html - () http://www.redhat.com/support/errata/RHSA-2004-583.html -
References () http://www.redhat.com/support/errata/RHSA-2005-014.html - () http://www.redhat.com/support/errata/RHSA-2005-014.html -
References () http://www.securityfocus.com/archive/1/426072/30/6740/threaded - () http://www.securityfocus.com/archive/1/426072/30/6740/threaded -
References () http://www.securityfocus.com/bid/11785 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/11785 - Patch, Vendor Advisory
References () http://www.trustix.org/errata/2004/0065/ - () http://www.trustix.org/errata/2004/0065/ -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18332 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18332 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10899 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10899 -
References () https://www.ubuntu.com/usn/usn-36-1/ - () https://www.ubuntu.com/usn/usn-36-1/ -

Information

Published : 2005-01-10 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-1014

Mitre link : CVE-2004-1014

CVE.ORG link : CVE-2004-1014


JSON object : View

Products Affected

mandrakesoft

  • mandrake_linux_corporate_server
  • mandrake_linux

redhat

  • enterprise_linux
  • enterprise_linux_desktop

debian

  • debian_linux

nfs

  • nfs-utils