ID CVE-2004-0154
Summary rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.
References
Vulnerable Configurations
  • cpe:2.3:a:nfs:nfs-utils:1.0
    cpe:2.3:a:nfs:nfs-utils:1.0
  • cpe:2.3:a:nfs:nfs-utils:1.0.1
    cpe:2.3:a:nfs:nfs-utils:1.0.1
  • cpe:2.3:a:nfs:nfs-utils:1.0.3
    cpe:2.3:a:nfs:nfs-utils:1.0.3
  • cpe:2.3:a:nfs:nfs-utils:1.0.4
    cpe:2.3:a:nfs:nfs-utils:1.0.4
  • cpe:2.3:a:nfs:nfs-utils:1.0.6
    cpe:2.3:a:nfs:nfs-utils:1.0.6
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
NASL family Red Hat Local Security Checks
NASL id REDHAT-RHSA-2004-072.NASL
description Updated nfs-utils packages that fix a flaw leading to possible rpc.mountd crashes are now available. The nfs-utils package contains the rpc.mountd program, which implements the NFS mount protocol. A flaw was discovered in versions of rpc.mountd in nfs-utils versions after 1.0.3 and prior to 1.0.6. When mounting a directory, rpc.mountd could crash if the reverse lookup of the client in DNS failed to match the forward lookup. An attacker who has the ability to mount remote directories from a server could make use of this flaw to cause a denial of service by making rpc.mountd crash. Users are advised to upgrade to these updated packages, which contain nfs-utils 1.0.6 and is not vulnerable to this issue. NOTE: Red Hat Enterprise Linux 2.1 includes a version of rpc.mountd that is not vulnerable to this issue.
last seen 2019-02-21
modified 2018-12-20
plugin id 12470
published 2004-07-06
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=12470
title RHEL 3 : nfs-utils (RHSA-2004:072)
oval via4
  • accepted 2010-09-20T04:00:43.548-04:00
    class vulnerability
    contributors
    • name Jay Beale
      organization Bastille Linux
    • name Matt Busby
      organization The MITRE Corporation
    • name Matt Busby
      organization The MITRE Corporation
    • name Thomas R. Jones
      organization Maitreya Security
    • name Jonathan Baker
      organization The MITRE Corporation
    description rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.
    family unix
    id oval:org.mitre.oval:def:861
    status accepted
    submitted 2004-03-20T12:00:00.000-04:00
    title rpc.mountd Denial of Service via NFS Mount
    version 37
  • accepted 2013-04-29T04:21:14.429-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    description rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.
    family unix
    id oval:org.mitre.oval:def:9673
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mount of a directory from a client whose reverse DNS lookup name is different from the forward lookup name.
    version 23
redhat via4
advisories
rhsa
id RHSA-2004:072
refmap via4
bid 9813
misc http://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=114535
trustix 2004-0009
xf nfs-utils-dns-dos(15418)
Last major update 21-08-2010 - 00:19
Published 14-06-2004 - 00:00
Last modified 10-10-2017 - 21:29
Back to Top