Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2013:178 | First vendor Publication | 2013-06-25 |
Vendor | Mandriva | Last vendor Modification | 2013-06-25 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:H/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 3.2 | Attack Range | Adjacent network |
Cvss Impact Score | 4.9 | Attack Complexity | High |
Cvss Expoit Score | 3.2 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Updated nfs-utils packages fix security vulnerability It was reported that rpc.gssd in nfs-utils is vulnerable to DNS spoofing due to it depending on PTR resolution for GSSAPI authentication. Because of this, if a user where able to poison DNS to a victim's computer, they would be able to trick rpc.gssd into talking to another server (perhaps with less security) than the intended server (with stricter security). If the victim has write access to the second (less secure) server, and the attacker has read access (when they normally might not on the secure server), the victim could write files to that server, which the attacker could obtain (when normally they would not be able to). To the victim this is transparent because the victim's computer asks the KDC for a ticket to the second server due to reverse DNS resolution; in this case Krb5 authentication does not fail because the victim is talking to the correct server (CVE-2013-1923). |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:178 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:25681 | |||
Oval ID: | oval:org.mitre.oval:def:25681 | ||
Title: | SUSE-SU-2013:1668-1 -- Security update for nfs-utils | ||
Description: | nfs-utils receives hereby a LTSS roll-up security and bugfix update. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1668-1 CVE-2013-1923 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 | Product(s): | nfs-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26060 | |||
Oval ID: | oval:org.mitre.oval:def:26060 | ||
Title: | SUSE-SU-2013:0822-1 -- Security update for nfs-utils | ||
Description: | This update fixes a DNS spoofing problem with NFS rpc-gssd. (CVE-2013-1923)(bnc#813464) Security Issue reference: * CVE-2013-1923 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0822-1 CVE-2013-1923 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 10 SUSE Linux Enterprise Desktop 10 | Product(s): | nfs-utils |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:26093 | |||
Oval ID: | oval:org.mitre.oval:def:26093 | ||
Title: | SUSE-SU-2013:0821-1 -- Security update for nfs-client | ||
Description: | This update fixes a DNS spoofing problem with NFS rpc-gssd. (CVE-2013-1923)(bnc#813464) It also adds MOUNTD_OPTIONS and GSSD_OPTIONS to /etc/sysconfig/nfs. (bnc#818094, bnc#816897) Security Issues: * CVE-2013-1923 <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923 > | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:0821-1 CVE-2013-1923 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 SUSE Linux Enterprise Desktop 11 | Product(s): | nfs-client |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-0822-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2013-1668-1.nasl - Type : ACT_GATHER_INFO |
2014-12-09 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-02.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-485.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-493.nasl - Type : ACT_GATHER_INFO |
2013-06-26 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-178.nasl - Type : ACT_GATHER_INFO |
2013-05-23 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_nfs-client-130510.nasl - Type : ACT_GATHER_INFO |
2013-05-23 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_nfs-utils-8569.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:43:51 |
|
2014-01-23 13:22:10 |
|
2014-01-21 21:25:04 |
|
2013-06-25 17:18:10 |
|