Executive Summary

Informations
Name CVE-2013-3266 First vendor Publication 2013-05-02
Vendor Cve Last vendor Modification 2013-11-25

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The nfsrvd_readdir function in sys/fs/nfsserver/nfs_nfsdport.c in the new NFS server in FreeBSD 8.0 through 9.1-RELEASE-p3 does not verify that a READDIR request is for a directory node, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by specifying a plain file instead of a directory.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3266

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:19984
 
Oval ID: oval:org.mitre.oval:def:19984
Title: DSA-2672-1 kfreebsd-9 - interpretation conflict
Description: Adam Nowacki discovered that the new FreeBSD NFS implementation processes a crafted READDIR request which instructs to operate a file system on a file node as if it were a directory node, leading to a kernel crash or potentially arbitrary code execution.
Family: unix Class: patch
Reference(s): DSA-2672-1
CVE-2013-3266
Version: 5
Platform(s): Debian GNU/kFreeBSD 7
Product(s): kfreebsd-9
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 6

Nessus® Vulnerability Scanner

Date Description
2013-05-23 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2672.nasl - Type : ACT_GATHER_INFO
2013-04-30 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_e66a6e2fb0d511e291640016e6dcb562.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
DEBIAN http://www.debian.org/security/2013/dsa-2672
FREEBSD http://www.freebsd.org/security/advisories/FreeBSD-SA-13:05.nfsserver.asc
SECTRACK http://www.securitytracker.com/id/1028491
SECUNIA http://secunia.com/advisories/53241

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Date Informations
2024-02-02 01:23:41
  • Multiple Updates
2024-02-01 12:07:05
  • Multiple Updates
2023-09-05 12:22:23
  • Multiple Updates
2023-09-05 01:06:59
  • Multiple Updates
2023-09-02 12:22:25
  • Multiple Updates
2023-09-02 01:07:04
  • Multiple Updates
2023-08-22 12:20:10
  • Multiple Updates
2022-10-11 01:06:46
  • Multiple Updates
2021-05-04 12:26:38
  • Multiple Updates
2021-04-22 01:32:14
  • Multiple Updates
2020-05-23 00:37:36
  • Multiple Updates
2019-03-19 12:05:47
  • Multiple Updates
2016-04-26 23:25:01
  • Multiple Updates
2014-02-17 11:20:45
  • Multiple Updates
2013-11-25 13:20:54
  • Multiple Updates
2013-05-30 13:23:36
  • Multiple Updates
2013-05-10 22:30:36
  • Multiple Updates
2013-05-02 17:19:45
  • First insertion