CVE-2018-17158

In FreeBSD before 11.2-STABLE(r340854) and 11.2-RELEASE-p5, an integer overflow error can occur when handling the client address length field in an NFSv4 request. Unprivileged remote users with access to the NFS server can crash the system by sending a specially crafted NFSv4 request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:11.2:p5:*:*:*:*:*:*

History

21 Nov 2024, 03:53

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106192 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106192 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1042164 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1042164 - Third Party Advisory, VDB Entry
References () https://secuniaresearch.flexerasoftware.com/secunia_research/2018-24/ - Third Party Advisory () https://secuniaresearch.flexerasoftware.com/secunia_research/2018-24/ - Third Party Advisory
References () https://security.freebsd.org/advisories/FreeBSD-SA-18:13.nfs.asc - Third Party Advisory () https://security.freebsd.org/advisories/FreeBSD-SA-18:13.nfs.asc - Third Party Advisory

Information

Published : 2018-12-04 15:29

Updated : 2024-11-21 03:53


NVD link : CVE-2018-17158

Mitre link : CVE-2018-17158

CVE.ORG link : CVE-2018-17158


JSON object : View

Products Affected

freebsd

  • freebsd
CWE
CWE-190

Integer Overflow or Wraparound