CVE-2013-6410

nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.1:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.2:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.3:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.4:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.5:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.6:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.8:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.9:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.10:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.11:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.12:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.13:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.14:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.15:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.16:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.17:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.18:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.19:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.20:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.21:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.22:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.23:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.24:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:2.9.25:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:3.0:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:3.1:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:3.2:*:*:*:*:*:*:*
cpe:2.3:a:wouter_verhelst:nbd:3.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

History

21 Nov 2024, 01:59

Type Values Removed Values Added
References () http://sourceforge.net/mailarchive/forum.php?thread_name=529BAA58.2080401%40uter.be&forum_name=nbd-general - Patch () http://sourceforge.net/mailarchive/forum.php?thread_name=529BAA58.2080401%40uter.be&forum_name=nbd-general - Patch
References () http://www.debian.org/security/2013/dsa-2806 - Third Party Advisory () http://www.debian.org/security/2013/dsa-2806 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2013/11/29/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2013/11/29/4 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/64002 - () http://www.securityfocus.com/bid/64002 -
References () http://www.ubuntu.com/usn/USN-2676-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-2676-1 - Third Party Advisory

Information

Published : 2013-12-07 20:55

Updated : 2024-11-21 01:59


NVD link : CVE-2013-6410

Mitre link : CVE-2013-6410

CVE.ORG link : CVE-2013-6410


JSON object : View

Products Affected

wouter_verhelst

  • nbd

debian

  • debian_linux

canonical

  • ubuntu_linux
CWE
CWE-264

Permissions, Privileges, and Access Controls