First published: Tue Dec 04 2018(Updated: )
In FreeBSD before 11.2-STABLE(r340854) and 11.2-RELEASE-p5, the NFS server lacks a bounds check in the READDIRPLUS NFS request. Unprivileged remote users with access to the NFS server can cause a resource exhaustion by forcing the server to allocate an arbitrarily large memory allocation.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | <11.2 | |
FreeBSD Kernel | =11.2-p5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17159 is classified as a high severity vulnerability due to its potential for resource exhaustion on the NFS server.
To fix CVE-2018-17159, upgrade to FreeBSD version 11.2-STABLE(r340854) or later, or the patched version 11.2-RELEASE-p5.
CVE-2018-17159 affects FreeBSD systems before version 11.2-STABLE(r340854) and 11.2-RELEASE-p5, where NFS server is in use.
Unprivileged remote users with access to the NFS server can exploit CVE-2018-17159 by sending crafted READDIRPLUS requests.
An attacker can perform a denial-of-service attack by forcing the NFS server to allocate excessive memory, leading to resource exhaustion.