FKIE_CVE-2011-0530
Vulnerability from fkie_nvd - Published: 2011-02-22 19:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| wouter_verhelst | nbd | * | |
| wouter_verhelst | nbd | 2.9.0 | |
| wouter_verhelst | nbd | 2.9.1 | |
| wouter_verhelst | nbd | 2.9.2 | |
| wouter_verhelst | nbd | 2.9.3 | |
| wouter_verhelst | nbd | 2.9.4 | |
| wouter_verhelst | nbd | 2.9.5 | |
| wouter_verhelst | nbd | 2.9.6 | |
| wouter_verhelst | nbd | 2.9.7 | |
| wouter_verhelst | nbd | 2.9.8 | |
| wouter_verhelst | nbd | 2.9.9 | |
| wouter_verhelst | nbd | 2.9.10 | |
| wouter_verhelst | nbd | 2.9.11 | |
| wouter_verhelst | nbd | 2.9.12 | |
| wouter_verhelst | nbd | 2.9.13 | |
| wouter_verhelst | nbd | 2.9.14 | |
| wouter_verhelst | nbd | 2.9.15 | |
| wouter_verhelst | nbd | 2.9.16 | |
| wouter_verhelst | nbd | 2.9.17 | |
| wouter_verhelst | nbd | 2.9.18 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "344B1EE6-E6C8-4554-9796-92EB76E36803",
"versionEndIncluding": "2.9.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB56984-E060-4C2C-9B41-D46F75C6C40D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17AA20F1-CEE5-4768-837F-845B25A7F8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C82F9D-3BEE-482D-8F83-1237EA6BA02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24E3411A-8602-4F5B-A9F1-7137D8F94971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF449CE-4E34-44AD-862D-B2BAD7C791A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB987D9-1A61-4817-AD2A-D3CCD9D65FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "08C9410A-65DF-4095-85AF-D3AED4B8DBEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E18B35-771D-4F90-B255-66799D1F4B05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "0EAC7C30-4702-42EF-B5B8-657C562C4AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "391B2B7C-D466-4C40-A2FB-8BB405BAF79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9AC011DE-6DA8-45C5-8DEE-65C9634AE61A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C074B157-E482-43D5-B23C-6447667AA862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "14D7CAD7-11EF-45E4-9B5C-C0CB509DD5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0E019AE8-04B6-4A3C-8D0D-CD5F8A6CC538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.14:*:*:*:*:*:*:*",
"matchCriteriaId": "3AB8A80B-07DC-4B7C-BD79-6CC5838703AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7A805944-8202-45DA-B60D-1A4748381934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D7FBADED-4469-4695-A930-F359359FCA1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.17:*:*:*:*:*:*:*",
"matchCriteriaId": "540E491B-7BDA-41A2-80AE-1BBC334083BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wouter_verhelst:nbd:2.9.18:*:*:*:*:*:*:*",
"matchCriteriaId": "096FF02B-91BF-4412-B9C5-A72F790BA87C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n mainloop en NBD-server.c en Network Block Device (nbd) antes de v2.9.20 podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una solicitud extensa. NOTA: este problema existe debido a una regresi\u00f3n CVE-2005-3534."
}
],
"id": "CVE-2011-0530",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-02-22T19:00:00.940",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/01/28/3"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/01/31/7"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43353"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/43610"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-201206-35.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2011/dsa-2183"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/46572"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0403"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2011/0582"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673562"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65720"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8"
},
{
"source": "secalert@redhat.com",
"url": "https://hermes.opensuse.org/messages/8086846"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/01/28/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://openwall.com/lists/oss-security/2011/01/31/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43353"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43610"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201206-35.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/46572"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2011/0403"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0582"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=673562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65720"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://hermes.opensuse.org/messages/8086846"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…