First published: Tue May 31 2011(Updated: )
nbd-server.c in Network Block Device (nbd-server) 2.9.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by causing a negotiation failure, as demonstrated by specifying a name for a non-existent export.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/nbd | 1:3.19-3+deb10u1 1:3.21-1+deb11u1 1:3.24-1.1 1:3.25-1 | |
wouter verhelst nbd | <=2.9.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1925 is considered a moderate severity vulnerability that can lead to a denial of service.
To fix CVE-2011-1925, upgrade to a patched version of the nbd package, such as 1:3.19-3+deb10u1 or later.
CVE-2011-1925 affects the nbd-server component of the Network Block Device software version up to 2.9.21.
The impact of CVE-2011-1925 is that it allows remote attackers to crash the nbd-server by causing a negotiation failure.
The vendor for the software affected by CVE-2011-1925 is Wouter Verhelst, the maintainer of the nbd software.