|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu USN-237-1 (nbd)|
|Summary:||Ubuntu USN-237-1 (nbd)|
The remote host is missing an update to nbd
announced via advisory USN-237-1.
A security issue affects the following Ubuntu releases:
Ubuntu 5.10 (Breezy Badger)
The following packages are affected: nbd-server
Kurt Fitzner discovered that the NBD (network block device) server did
not correctly verify the maximum size of request packets. By sending
specially crafted large request packets, a remote attacker who is
allowed to access the server could exploit this to execute arbitrary
code with root privileges.
The problem can be corrected by upgrading the affected package to
version 1:2.7.4-1ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.
Risk factor : High
BugTraq ID: 15363|
Common Vulnerability Exposure (CVE) ID: CVE-2005-3354
Debian Security Information: DSA-906 (Google Search)
SuSE Security Announcement: SUSE-SR:2005:028 (Google Search)
XForce ISS Database: sylpheed-ldif-dos(23028)
|Copyright||Copyright (c) 2006 E-Soft Inc. http://www.securityspace.com|
|This is only one of 47569 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.