[36361] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SUSE Security Announcement: kernel (SUSE-SA:2004:028)

daemon@ATHENA.MIT.EDU (Paul Starzetz)
Thu Sep 2 15:12:39 2004

Message-ID: <41370BC6.9090704@starzetz.de>
Date: Thu, 02 Sep 2004 14:02:14 +0200
From: Paul Starzetz <paul@starzetz.de>
MIME-Version: 1.0
To: Thomas Biege <thomas@suse.de>
Cc: bugtraq@securityfocus.com
In-Reply-To: <4135C1D7.mailITL119XB2@suse.de>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit

Thomas Biege wrote:

>    Various signedness issues and integer overflows have been fixed within
>    kNFSd and the XDR decode functions of kernel 2.6.
>    These bugs can be triggered remotely by sending a package with a trusted
>    source IP address and a write request with a size greater then 2^31.
>    The result will be a kernel Oops, it is unknown if this bug is otherwise
>    exploitable yet.
>    Kernel 2.4 nfsd code is different but may suffer from the same
>    vulnerability.
>  
>
The iSEC people have read the nfsd code from 2.4 and it seems to be 
vulnerable too, however only authenticated clients could reach the 
problematic places at all. Having a writeable NFS share is probably a 
bad idea anyway...

home help back first fref pref prev next nref lref last post