7.5
CVSSv2

CVE-2011-0530

Published: 22/02/2011 Updated: 17/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) prior to 2.9.20 might allow remote malicious users to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wouter verhelst nbd 2.9.14

wouter verhelst nbd 2.9.15

wouter verhelst nbd 2.9.7

wouter verhelst nbd 2.9.8

wouter verhelst nbd 2.9.0

wouter verhelst nbd

wouter verhelst nbd 2.9.11

wouter verhelst nbd 2.9.12

wouter verhelst nbd 2.9.2

wouter verhelst nbd 2.9.5

wouter verhelst nbd 2.9.18

wouter verhelst nbd 2.9.13

wouter verhelst nbd 2.9.6

wouter verhelst nbd 2.9.4

wouter verhelst nbd 2.9.1

wouter verhelst nbd 2.9.16

wouter verhelst nbd 2.9.17

wouter verhelst nbd 2.9.10

wouter verhelst nbd 2.9.9

wouter verhelst nbd 2.9.3

Vendor Advisories

Debian Bug report logs - #611187 nbd-server dies due to EFAULT from read Package: nbd-server; Maintainer for nbd-server is Wouter Verhelst <wouter@debianorg>; Source for nbd-server is src:nbd (PTS, buildd, popcon) Reported by: Ian Jackson <IanJackson@eucitrixcom> Date: Wed, 26 Jan 2011 15:03:02 UTC Severity: ser ...
An attacker could send crafted input to NBD and cause it to crash or to run arbitrary programs ...
It was discovered a regression of a buffer overflow (CVE-2005-3534) in NBD, the Network Block Device server, that could allow arbitrary code execution on the NBD server via a large request For the oldstable distribution (lenny), this problem has been fixed in version 1:2911-3lenny1 The stable distribution (squeeze), the testing distribution (wh ...