CVE-2011-0530

Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
References
Link Resource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://openwall.com/lists/oss-security/2011/01/28/3 Patch
http://openwall.com/lists/oss-security/2011/01/31/7 Patch
http://secunia.com/advisories/43353 Vendor Advisory
http://secunia.com/advisories/43610
http://security.gentoo.org/glsa/glsa-201206-35.xml
http://www.debian.org/security/2011/dsa-2183
http://www.securityfocus.com/bid/46572
http://www.vupen.com/english/advisories/2011/0403 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0582
https://bugzilla.redhat.com/show_bug.cgi?id=673562 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65720
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 Patch
https://hermes.opensuse.org/messages/8086846
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
http://openwall.com/lists/oss-security/2011/01/28/3 Patch
http://openwall.com/lists/oss-security/2011/01/31/7 Patch
http://secunia.com/advisories/43353 Vendor Advisory
http://secunia.com/advisories/43610
http://security.gentoo.org/glsa/glsa-201206-35.xml
http://www.debian.org/security/2011/dsa-2183
http://www.securityfocus.com/bid/46572
http://www.vupen.com/english/advisories/2011/0403 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0582
https://bugzilla.redhat.com/show_bug.cgi?id=673562 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/65720
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 Patch
https://hermes.opensuse.org/messages/8086846
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.3:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.4:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.5:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.6:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.8:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.9:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.10:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.11:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.12:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.13:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.14:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.16:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.18:*:*:*:*:*:*:*

History

21 Nov 2024, 01:24

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187 -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html - Patch () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html - Patch () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html -
References () http://openwall.com/lists/oss-security/2011/01/28/3 - Patch () http://openwall.com/lists/oss-security/2011/01/28/3 - Patch
References () http://openwall.com/lists/oss-security/2011/01/31/7 - Patch () http://openwall.com/lists/oss-security/2011/01/31/7 - Patch
References () http://secunia.com/advisories/43353 - Vendor Advisory () http://secunia.com/advisories/43353 - Vendor Advisory
References () http://secunia.com/advisories/43610 - () http://secunia.com/advisories/43610 -
References () http://security.gentoo.org/glsa/glsa-201206-35.xml - () http://security.gentoo.org/glsa/glsa-201206-35.xml -
References () http://www.debian.org/security/2011/dsa-2183 - () http://www.debian.org/security/2011/dsa-2183 -
References () http://www.securityfocus.com/bid/46572 - () http://www.securityfocus.com/bid/46572 -
References () http://www.vupen.com/english/advisories/2011/0403 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0403 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0582 - () http://www.vupen.com/english/advisories/2011/0582 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=673562 - Patch () https://bugzilla.redhat.com/show_bug.cgi?id=673562 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/65720 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/65720 -
References () https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 - Patch () https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8 - Patch
References () https://hermes.opensuse.org/messages/8086846 - () https://hermes.opensuse.org/messages/8086846 -

Information

Published : 2011-02-22 19:00

Updated : 2024-11-21 01:24


NVD link : CVE-2011-0530

Mitre link : CVE-2011-0530

CVE.ORG link : CVE-2011-0530


JSON object : View

Products Affected

wouter_verhelst

  • nbd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer