|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2004-0946: nfs-utils overflow on 64bit arch | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Sebastian Krahmer <krahmer> |
| Component: | Incidents | Assignee: | Ruediger Oertel <ro> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2004-0946: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Sebastian Krahmer
2004-11-24 17:46:10 UTC
<!-- SBZ_reproduce --> Looks to me as he is correct. Our SL 9.2 which I reviewed seems to have this problem. any patch available already ? Does this really qualify as a security problem? Yes, it overflows, but the value that gets scribbled past the end of the struct (which should be a static variable BTW if it's standard rpcgen code) is dqb_itime. This is a time limit set by the administrator. I cannot even start to imagine how to exploit this bug in any security relevant way. Fixing this in STABLE should be sufficient, I think. Would be fine with me. However, you know how people read heise news 'overflow in rpc.quotad'. now that you mention it: that's perfect ;-) we never used the quotad from nfs-utils (not even sles7), so this is completely unrelated for us. (please close this bug if you agree) PS: But it might be that package quota has a similar problem ... i have already checked the quota package, it is not affected. good to hear we never used it. Ok, so fix in STABLE will suffice. CVE-2004-0946: CVSS v2 Base Score: 10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) |