Executive Summary

Informations
Name CVE-2011-2500 First vendor Publication 2014-02-15
Vendor Cve Last vendor Modification 2014-03-06

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The host_reliable_addrinfo function in support/export/hostname.c in nfs-utils before 1.2.4 does not properly use DNS to verify access to NFS exports, which allows remote attackers to mount filesystems by establishing crafted DNS A and PTR records.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2500

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26935
 
Oval ID: oval:org.mitre.oval:def:26935
Title: RHSA-2011:1534 -- nfs-utils security, bug fix, and enhancement update (Low)
Description: The nfs-utils packages provide a daemon for the kernel Network File System (NFS) server, and related tools such as the mount.nfs, umount.nfs, and showmount programs. A flaw was found in the way nfs-utils performed IP based authentication of mount requests. In configurations where a directory was exported to a group of systems using a DNS wildcard or NIS (Network Information Service) netgroup, an attacker could possibly gain access to other directories exported to a specific host or subnet, bypassing intended access restrictions. (CVE-2011-2500) It was found that the mount.nfs tool did not handle certain errors correctly when updating the mtab (mounted file systems table) file. A local attacker could use this flaw to corrupt the mtab file. (CVE-2011-1749) This update also fixes several bugs and adds an enhancement. Documentation for these bug fixes and the enhancement will be available shortly from the Technical Notes document, linked to in the References section. Users of nfs-utils are advised to upgrade to these updated packages, which contain backported patches to resolve these issues and add this enhancement. After installing this update, the nfs service will be restarted automatically.
Family: unix Class: patch
Reference(s): RHSA-2011:1534
CVE-2011-1749
CVE-2011-2500
Version: 3
Platform(s): Red Hat Enterprise Linux 6
Product(s): nfs-utils
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27486
 
Oval ID: oval:org.mitre.oval:def:27486
Title: ELSA-2011-1534 -- nfs-utils security, bug fix, and enhancement update (low)
Description: [1.2.3-15] - mout.nfs: Don't roll back to IPv4 whe IPv6 fails (bz 744657) - rpcdebug: Added pNFS and FSCache debugging (bz 747400) [1.2.3-14] - mount.nfs: Backported how upstream handles the SIGXFSZ signal (bz 697981) [1.2.3-13] - mount.nfs: Reworked the code that deals with RLIMIT_FSIZE (bz 697981) [1.2.3-12] - Removed the stripping of debugging information from rpcdebug (bz 729001) [1.2.3-11] - mount.nfs: Fixed problem in mount error verbosity patch (bz 731693) [1.2.3-10] - mount.nfs: add error verbosity to invalid versions (bz 731693) [1.2.3-9] - umount.nfs: Got IPV6 unmounts working again (bz 732673) - mountd: return multiple hosts exporting the same directory (bz 726112) - mount: Better error message for invalid version (bz 723780) [1.2.3-8] - initscripts: just try to mount rpc_pipefs always (bz 692702) - Rely on crypto module autoloading in init scripts - svcgssd: Document '-n' for svcgssd (bz 697359) - mount.nfs: anticipate RLIMIT_FSIZE (bz 697981) - exportfs manpage: Ipv6 update (bz 715078) - mountd: Stop segfault in mtab code (bz 723438) - exportfs: wilcards in exports can lead to unintended mounts (bz 715391) - umount: allow spaces in unmount paths (bz 702273) - specfile: reordered how libgssglue is linked in (bz 720479)
Family: unix Class: patch
Reference(s): ELSA-2011-1534
CVE-2011-1749
CVE-2011-2500
Version: 3
Platform(s): Oracle Linux 6
Product(s): nfs-utils
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5

OpenVAS Exploits

Date Description
2012-07-09 Name : RedHat Update for nfs-utils RHSA-2011:1534-03
File : nvt/gb_RHSA-2011_1534-03_nfs-utils.nasl
2011-07-12 Name : Fedora Update for nfs-utils FEDORA-2011-8934
File : nvt/gb_fedora_2011_8934_nfs-utils_fc15.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
77565 nfs-utils Mount Request Directory Export Access Restriction Bypass

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_4_nfs-client-110701.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20111206_nfs_utils_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2011-12-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1534.nasl - Type : ACT_GATHER_INFO
2011-07-11 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_nfs-client-110701.nasl - Type : ACT_GATHER_INFO
2011-07-07 Name : The remote Fedora host is missing a security update.
File : fedora_2011-8934.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/
http://sourceforge.net/projects/nfs/files/nfs-utils/1.2.4/Changelog-nfs-utils...
https://bugzilla.redhat.com/show_bug.cgi?id=716949
MLIST http://marc.info/?l=linux-nfs&m=130875695821953&w=2
REDHAT http://rhn.redhat.com/errata/RHSA-2011-1534.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2024-02-02 12:15:10
  • Multiple Updates
2021-05-04 12:14:43
  • Multiple Updates
2021-04-22 01:16:02
  • Multiple Updates
2020-05-23 01:44:49
  • Multiple Updates
2020-05-23 00:28:56
  • Multiple Updates
2014-06-14 13:31:01
  • Multiple Updates
2014-03-06 13:21:48
  • Multiple Updates
2014-02-18 21:20:59
  • Multiple Updates
2014-02-17 11:03:18
  • Multiple Updates
2014-02-15 17:18:51
  • First insertion