Vulnerability Details : CVE-2011-0530
Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request. NOTE: this issue exists because of a CVE-2005-3534 regression.
Vulnerability category: OverflowExecute code
Products affected by CVE-2011-0530
- cpe:2.3:a:wouter_verhelst:nbd:*:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.14:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.15:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.12:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.18:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.16:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.17:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:wouter_verhelst:nbd:2.9.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-0530
26.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-0530
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2011-0530
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0530
-
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2011:005
-
http://openwall.com/lists/oss-security/2011/01/28/3
oss-security - CVE Request -- NDB: CVE-2005-3534 reintroduced in upstream nbd-v2.9.0 versionPatch
-
https://bugzilla.redhat.com/show_bug.cgi?id=673562
673562 – (CVE-2011-0530) CVE-2011-0530 NBD: CVE-2005-3534 reintroduced in upstream nbd-v2.9.0 versionPatch
-
http://security.gentoo.org/glsa/glsa-201206-35.xml
nbd: Multiple vulnerabilities (GLSA 201206-35) — Gentoo security
-
http://www.vupen.com/english/advisories/2011/0582
Webmail | OVH- OVH
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/65720
Network Block Device nbd-server.c buffer overflow CVE-2011-0530 Vulnerability Report
-
http://www.debian.org/security/2011/dsa-2183
Debian -- Security Information -- DSA-2183-1 nbd
-
http://openwall.com/lists/oss-security/2011/01/31/7
oss-security - Re: CVE Request -- NDB: CVE-2005-3534 reintroduced in upstream nbd-v2.9.0 versionPatch
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054083.html
[SECURITY] Fedora 14 Update: nbd-2.9.20-1.fc14Patch
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/054071.html
[SECURITY] Fedora 13 Update: nbd-2.9.20-1.fc13Patch
-
http://www.securityfocus.com/bid/46572
Network Block Device Server (CVE-2011-0530) Remote Buffer Overflow Vulnerability
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=611187
#611187 - nbd-server dies due to EFAULT from read - Debian Bug report logs
-
http://www.vupen.com/english/advisories/2011/0403
Webmail | OVH- OVHVendor Advisory
-
https://hermes.opensuse.org/messages/8086846
openSUSE.org - 503
-
https://github.com/yoe/nbd/commit/3ef52043861ab16352d49af89e048ba6339d6df8
Fix buffer size checking · NetworkBlockDevice/nbd@3ef5204 · GitHubPatch
Jump to