Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.870655
Categoría:Red Hat Local Security Checks
Título:RedHat Update for nfs-utils RHSA-2011:1534-03
Resumen:The remote host is missing an update for the 'nfs-utils'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'nfs-utils'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The nfs-utils packages provide a daemon for the kernel Network File System
(NFS) server, and related tools such as the mount.nfs, umount.nfs, and
showmount programs.

A flaw was found in the way nfs-utils performed IP based authentication of
mount requests. In configurations where a directory was exported to a group
of systems using a DNS wildcard or NIS (Network Information Service)
netgroup, an attacker could possibly gain access to other directories
exported to a specific host or subnet, bypassing intended access
restrictions. (CVE-2011-2500)

It was found that the mount.nfs tool did not handle certain errors
correctly when updating the mtab (mounted file systems table) file. A local
attacker could use this flaw to corrupt the mtab file. (CVE-2011-1749)

This update also fixes several bugs and adds an enhancement. Documentation
for these bug fixes and the enhancement will be available shortly from the
Technical Notes document, linked to in the References section.

Users of nfs-utils are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues and add this
enhancement. After installing this update, the nfs service will be
restarted automatically.

Affected Software/OS:
nfs-utils on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1749
RHSA-2011:1534
http://rhn.redhat.com/errata/RHSA-2011-1534.html
RHSA-2012:0310
http://rhn.redhat.com/errata/RHSA-2012-0310.html
[oss-security] 20140425 Re: CVE request: CVE-2011-1089-like flaw in mount.nfs
http://www.openwall.com/lists/oss-security/2011/04/25/5
http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils-1.2.4/download
https://bugzilla.redhat.com/show_bug.cgi?id=697975
Common Vulnerability Exposure (CVE) ID: CVE-2011-2500
[linux-nfs] 20110622 [PATCH] nfs: fix host_reliable_addrinfo (try #2)
http://marc.info/?l=linux-nfs&m=130875695821953&w=2
http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/
https://bugzilla.redhat.com/show_bug.cgi?id=716949
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.