TITLE: Network Block Device Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA18135 VERIFY ADVISORY: http://secunia.com/advisories/18135/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From local network SOFTWARE: Network Block Device (nbd) 2.x http://secunia.com/product/6640/ DESCRIPTION: Kurt Fitzner has reported a vulnerability in Network Block Device (nbd), which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in nbd-server when handling a specially crafted request. This may be exploited to cause a buffer overflow in the nbd-server. SOLUTION: Restrict use to within trusted networks. Some Linux vendors have issued fixed packages. PROVIDED AND/OR DISCOVERED BY: Kurt Fitzner ORIGINAL ADVISORY: Debian: http://www.debian.org/security/2005/dsa-924 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------