7.8
CVSSv2

CVE-2015-0847

Published: 29/05/2015 Updated: 31/12/2016
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

nbd-server.c in Network Block Device (nbd-server) prior to 3.11 does not properly handle signals, which allows remote malicious users to cause a denial of service (deadlock) via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

canonical ubuntu linux 15.04

canonical ubuntu linux 14.10

wouter verhelst nbd

Vendor Advisories

Several security issues were fixed in NBD ...
Debian Bug report logs - #784657 nbd: CVE-2015-0847: unsafe signal handling Package: src:nbd; Maintainer for src:nbd is Wouter Verhelst <wouter@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 7 May 2015 14:27:02 UTC Severity: important Tags: patch, security, upstream Found in versions ...
Debian Bug report logs - #781547 nbd: CVE-2013-7441: server dies if client asks for a non-existing export Package: nbd-server; Maintainer for nbd-server is Wouter Verhelst <wouter@debianorg>; Source for nbd-server is src:nbd (PTS, buildd, popcon) Reported by: Tuomas Räsänen <tuomasjjrasanen@tjjrfi> Date: Mon, 30 ...
Tuomas Räsänen discovered that unsafe signal handling in nbd-server, the server for the Network Block Device protocol, could allow remote attackers to cause a deadlock in the server process and thus a denial of service Tuomas Räsänen also discovered that the modern-style negotiation was carried out in the main server process before forking the ...