CERTA-2005-AVI-199
Vulnerability from certfr_avis - Published: 2005-06-09 - Updated: 2005-06-09None
Description
rpc.mountd est un service permettant le montage depuis un serveur NFS de volumes distants.
bigskip
Selon SGI, deux vulnérabilités sont présentes dans le service rpc.mountd :
- CVE CAN-2005-139 : il est possible de contourner la limition d'accès en lecture ;
- CVE CAN-2005-138 : un déni de service est possible lorque les clients anonymes ne possèdent pas de résolution inverse du nom de machine.
Solution
Se référer au bulletin de sécurité de l'éditeur (cf. section Documentation) pour l'obtention des correctifs.
SGI IRIX versions 6.5.25, 6.5.26 et 6.5.27.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eSGI IRIX versions 6.5.25, 6.5.26 et 6.5.27.\u003c/p\u003e",
"content": "## Description\n\nrpc.mountd est un service permettant le montage depuis un serveur NFS de\nvolumes distants.\n\nbigskip\n\nSelon SGI, deux vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans le service rpc.mountd\n:\n\n- CVE CAN-2005-139 : il est possible de contourner la limition d\u0027acc\u00e8s\n en lecture ;\n- CVE CAN-2005-138 : un d\u00e9ni de service est possible lorque les\n clients anonymes ne poss\u00e8dent pas de r\u00e9solution inverse du nom de\n machine.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur (cf. section\nDocumentation) pour l\u0027obtention des correctifs.\n",
"cves": [],
"initial_release_date": "2005-06-09T00:00:00",
"last_revision_date": "2005-06-09T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SGI 20050601-01-P du 09 juin 2005 :",
"url": "ftp://patches.sgi.com/support/free/security/advisories/20050601-01-P.asc"
}
],
"reference": "CERTA-2005-AVI-199",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9s de rpc.mountd sous SGI IRIX",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 20050601-01-P de SGI",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…