Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.880676
Categoría:CentOS Local Security Checks
Título:CentOS Update for nfs-utils CESA-2009:1321 centos5 i386
Resumen:The remote host is missing an update for the 'nfs-utils'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'nfs-utils'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The nfs-utils package provides a daemon for the kernel NFS server and
related tools.

It was discovered that nfs-utils did not use tcp_wrappers correctly.
Certain hosts access rules defined in '/etc/hosts.allow' and
'/etc/hosts.deny' may not have been honored, possibly allowing remote
attackers to bypass intended access restrictions. (CVE-2008-4552)

This updated package also fixes the following bugs:

* the 'LOCKD_TCPPORT' and 'LOCKD_UDPPORT' options in '/etc/sysconfig/nfs'
were not honored: the lockd daemon continued to use random ports. With this
update, these options are honored. (BZ#434795)

* it was not possible to mount NFS file systems from a system that has
the '/etc/' directory mounted on a read-only file system (this could occur
on systems with an NFS-mounted root file system). With this update, it is
possible to mount NFS file systems from a system that has '/etc/' mounted
on a read-only file system. (BZ#450646)

* arguments specified by 'STATDARG=' in '/etc/sysconfig/nfs' were removed
by the nfslock init script, meaning the arguments specified were never
passed to rpc.statd. With this update, the nfslock init script no longer
removes these arguments. (BZ#459591)

* when mounting an NFS file system from a host not specified in the NFS
server's '/etc/exports' file, a misleading 'unknown host' error was logged
on the server (the hostname lookup did not fail). With this update, a
clearer error message is provided for these situations. (BZ#463578)

* the nhfsstone benchmark utility did not work with NFS version 3 and 4.
This update adds support to nhfsstone for NFS version 3 and 4. The new
nhfsstone '-2', '-3', and '-4' options are used to select an NFS version
(similar to nfsstat(8)). (BZ#465933)

* the exportfs(8) manual page contained a spelling mistake, 'djando', in
the EXAMPLES section. (BZ#474848)

* in some situations the NFS server incorrectly refused mounts to hosts
that had a host alias in a NIS netgroup. (BZ#478952)

* in some situations the NFS client used its cache, rather than using
the latest version of a file or directory from a given export. This update
adds a new mount option, 'lookupcache=', which allows the NFS client to
control how it caches files and directories. Note: The Red Hat Enterprise
Linux 5.4 kernel update (the fourth regular update) must be installed in
order to use the 'lookupcache=' option.

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
nfs-utils on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-4552
20081030 rPSA-2008-0307-1 nfs-client nfs-server nfs-utils
http://www.securityfocus.com/archive/1/497935/100/0/threaded
31823
http://www.securityfocus.com/bid/31823
32346
http://secunia.com/advisories/32346
32481
http://secunia.com/advisories/32481
33006
http://secunia.com/advisories/33006
36538
http://secunia.com/advisories/36538
38794
http://secunia.com/advisories/38794
38833
http://secunia.com/advisories/38833
ADV-2010-0528
http://www.vupen.com/english/advisories/2010/0528
MDVSA-2009:060
http://www.mandriva.com/security/advisories?name=MDVSA-2009:060
RHSA-2009:1321
http://www.redhat.com/support/errata/RHSA-2009-1321.html
USN-687-1
http://www.ubuntu.com/usn/USN-687-1
[oss-security] 20120719 CVE Request: quota: incorrect use of tcp_wrappers
http://www.openwall.com/lists/oss-security/2012/07/19/2
[oss-security] 20120719 Re: CVE Request: quota: incorrect use of tcp_wrappers
http://www.openwall.com/lists/oss-security/2012/07/19/5
[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
http://wiki.rpath.com/Advisories:rPSA-2008-0307
https://bugzilla.redhat.com/show_bug.cgi?id=458676
nfsutils-hostctl-security-bypass(45895)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45895
oval:org.mitre.oval:def:11544
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11544
oval:org.mitre.oval:def:8325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8325
CopyrightCopyright (C) 2011 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.