7.5
CVSSv2

CVE-2005-3534

Published: 22/12/2005 Updated: 03/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the Network Block Device (nbd) server 2.7.5 and previous versions, and 2.8.0 up to and including 2.8.2, allows remote malicious users to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header.

Vulnerable Product Search on Vulmon Subscribe to Product

wouter verhelst nbd 2.8.0

wouter verhelst nbd 2.8.2

wouter verhelst nbd

Vendor Advisories

Debian Bug report logs - #611187 nbd-server dies due to EFAULT from read Package: nbd-server; Maintainer for nbd-server is Wouter Verhelst <wouter@debianorg>; Source for nbd-server is src:nbd (PTS, buildd, popcon) Reported by: Ian Jackson <IanJackson@eucitrixcom> Date: Wed, 26 Jan 2011 15:03:02 UTC Severity: ser ...
It was discovered a regression of a buffer overflow (CVE-2005-3534) in NBD, the Network Block Device server, that could allow arbitrary code execution on the NBD server via a large request For the oldstable distribution (lenny), this problem has been fixed in version 1:2911-3lenny1 The stable distribution (squeeze), the testing distribution (wh ...
Kurt Fitzner discovered a buffer overflow in nbd, the network block device client and server that could potentially allow arbitrary code on the NBD server For the old stable distribution (woody) this problem has been fixed in version 12cvs20020320-3woody3 For the stable distribution (sarge) this problem has been fixed in version 273-3sarge1 ...