VYPR

Nbd

by Wouter Verhelst

CVEs (6)

  • CVE-2005-3534Dec 22, 2005
    risk 0.01cvss epss 0.14

    Buffer overflow in the Network Block Device (nbd) server 2.7.5 and earlier, and 2.8.0 through 2.8.2, allows remote attackers to execute arbitrary code via a large request, which is written past the end of the buffer because nbd does not account for memory taken by the reply header.

  • CVE-2015-0847May 29, 2015
    risk 0.00cvss epss 0.03

    nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.

  • CVE-2013-7441May 29, 2015
    risk 0.00cvss epss 0.04

    The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.

  • CVE-2013-6410Dec 7, 2013
    risk 0.00cvss epss 0.00

    nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.

  • CVE-2011-1925May 31, 2011
    risk 0.00cvss epss 0.01

    nbd-server.c in Network Block Device (nbd-server) 2.9.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by causing a negotiation failure, as demonstrated by specifying a name for a non-existent export.

  • CVE-2011-0530Feb 22, 2011
    risk 0.00cvss epss 0.10

    Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.