7.5
CVSSv2

CVE-2022-26496

Published: 06/03/2022 Updated: 04/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In nbd-server in nbd prior to 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

network block device project network block device

debian debian linux 10.0

debian debian linux 11.0

fedoraproject fedora 34

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

Debian Bug report logs - #1006915 security issues in nbd-server: CVE-2022-26495 CVE-2022-26496 Package: src:nbd; Maintainer for src:nbd is Wouter Verhelst <wouter@debianorg>; Reported by: Wouter Verhelst <wouter@debianorg> Date: Tue, 8 Mar 2022 08:09:01 UTC Severity: serious Tags: fixed-upstream, security, upstrea ...
Two vulnerabilities were discovered in the server for the Network Block Device (NBD), which could result in the execution of arbitrary code For the oldstable distribution (buster), these problems have been fixed in version 1:319-3+deb10u1 For the stable distribution (bullseye), these problems have been fixed in version 1:321-1+deb11u1 We recom ...

Exploits

Shannon Baseband suffers from a memory corruption vulnerability that occurs when the baseband modem processes SDP when setting up a call When an fmtp attribute is parsed, the integer that represents the payload type is copied into an 8-byte buffer using memcpy with the length of payload type as the length parameter There are no checks that the pa ...