CWE
119
Advisory Published

RHSA-2007:0951: Important: nfs-utils-lib security update

First published: Tue Oct 02 2007(Updated: )

The nfs-utils-lib package contains support libraries that are needed by the<br>commands and daemons of the nfs-utils package.<br>The updated nfs-utils package fixes the following vulnerabilities:<br>Tenable Network Security discovered a stack buffer overflow flaw in the RPC<br>library used by nfs-utils-lib. A remote unauthenticated attacker who can<br>access an application linked against nfs-utils-lib could trigger this flaw<br>and cause the application to crash. On Red Hat Enterprise Linux 5 it is not<br>possible to exploit this flaw to run arbitrary code as the overflow is<br>blocked by FORTIFY_SOURCE. (CVE-2007-3999)<br>Tony Ernst from SGI has discovered a flaw in the way nfsidmap maps NFSv4<br>unknown uids. If an unknown user ID is encountered on an NFSv4 mounted<br>filesystem, the files will default to being owned by 'root' rather than<br>'nobody'. (CVE-2007-4135)<br>Users of nfs-utils-lib are advised to upgrade to this updated package,<br>which contains backported patches to resolve these issues.

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203