RHEL 2.1 : nfs-utils (RHSA-2005:014)

critical Nessus Plugin ID 16147

Synopsis

The remote Red Hat host is missing a security update.

Description

An updated nfs-utils package that fixes various security issues is now available.

The nfs-utils package provides a daemon for the kernel NFS server and related tools.

SGI reported that the statd daemon did not properly handle the SIGPIPE signal. A misconfigured or malicious peer could cause statd to crash, leading to a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-1014 to this issue.

Arjan van de Ven discovered a buffer overflow in rquotad. On 64-bit architectures, an improper integer conversion can lead to a buffer overflow. An attacker with access to an NFS share could send a specially crafted request which could lead to the execution of arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0946 to this issue.

All users of nfs-utils should upgrade to this updated package, which resolves these issues.

Solution

Update the affected nfs-utils package.

See Also

https://access.redhat.com/security/cve/cve-2004-0946

https://access.redhat.com/security/cve/cve-2004-1014

https://access.redhat.com/errata/RHSA-2005:014

Plugin Details

Severity: Critical

ID: 16147

File Name: redhat-RHSA-2005-014.nasl

Version: 1.27

Type: local

Agent: unix

Published: 1/13/2005

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:nfs-utils, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 1/12/2005

Vulnerability Publication Date: 1/10/2005

Reference Information

CVE: CVE-2004-0946, CVE-2004-1014

RHSA: 2005:014