Vulnerability Details : CVE-2008-4552
The good_client function in nfs-utils 1.0.9, and possibly other versions before 1.1.3, invokes the hosts_ctl function with the wrong order of arguments, which causes TCP Wrappers to ignore netgroups and allows remote attackers to bypass intended access restrictions.
Products affected by CVE-2008-4552
- cpe:2.3:a:nfs:nfs-utils:*:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:0.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:0.2:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-3:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-4:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.7:pre-2:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.7:pre-1:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-1:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.0.8:rc-2:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.1.0:rc-1:*:*:*:*:*:*
- cpe:2.3:a:nfs:nfs-utils:1.1.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-4552
2.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-4552
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-4552
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-4552
-
Red Hat 2009-09-02This issue affected Red Hat Enterprise Linux 5 and was addressed by https://rhn.redhat.com/errata/RHSA-2009-1321.html
References for CVE-2008-4552
-
http://www.redhat.com/support/errata/RHSA-2009-1321.html
Support
-
http://www.openwall.com/lists/oss-security/2012/07/19/2
oss-security - CVE Request: quota: incorrect use of tcp_wrappers
-
http://www.vupen.com/english/advisories/2010/0528
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
-
http://www.openwall.com/lists/oss-security/2012/07/19/5
oss-security - Re: CVE Request: quota: incorrect use of tcp_wrappers
-
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
502 Bad Gateway
-
http://www.ubuntu.com/usn/USN-687-1
USN-687-1: nfs-utils vulnerability | Ubuntu security notices | Ubuntu
-
http://www.securityfocus.com/archive/1/497935/100/0/threaded
-
http://wiki.rpath.com/Advisories:rPSA-2008-0307
-
http://www.securityfocus.com/bid/31823
Patch
-
http://www.mandriva.com/security/advisories?name=MDVSA-2009:060
Mandriva
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11544
404 Not Found
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/45895
Red Hat nfs-utils host_ctl security bypass CVE-2008-4552 Vulnerability Report
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8325
404 Not Found
-
https://bugzilla.redhat.com/show_bug.cgi?id=458676
458676 – (CVE-2008-4552) CVE-2008-4552 nfs-utils: incorrect use of tcp_wrappers, causing hostname-based rules to be ignored
Jump to