Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: nfs-util denial of service fix Print E-mail
User Rating:      How can I rate this item?
Posted by Joe Shakespeare   
Debian SGI has discovered that rpc.statd from the nfs-utils package, the Network Status Monitor, did not ignore the "SIGPIPE". Hence, a client prematurely terminating the TCP connection could also terminate the server process.

Debian Security Advisory DSA 606-1                                        Martin Schulze
December 8th, 2004            

Package        : nfs-utils
Vulnerability  : wrong signal handler
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-1014

SGI has discovered that rpc.statd from the nfs-utils package, the
Network Status Monitor, did not ignore the "SIGPIPE".  Hence, a client
prematurely terminating the TCP connection could also terminate the
server process.

For the stable distribution (woody) this problem has been fixed in
version 1.0-2woody2.

For the unstable distribution (sid) this problem will be fixed soon.

We recommend that you upgrade your nfs-utils package.

Upgrade Instructions

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody

  Source archives:
      Size/MD5 checksum:      547 3130d22c0276d04624c6f2d1a11c8303
      Size/MD5 checksum:   241106 1ad532739493eb1e75a8398b34d1ad7d

  Alpha architecture:
      Size/MD5 checksum:    52842 015c232faf3cee96a5c3a54678c59977
      Size/MD5 checksum:    79518 b4f4190c36fef9a93a2082bffd0e4d84
      Size/MD5 checksum:    36782 6dd2f841d3e11784d2c8d1b4bd07dfd3

  ARM architecture:
      Size/MD5 checksum:    44942 6c5f08da6424e097c8f1d8d4707f438f
      Size/MD5 checksum:    67632 8de496b9ec85c6c7701936d53c54d8c4
      Size/MD5 checksum:    34466 d76dba5e7e3959106a5ae61546d10ca0

  Intel IA-32 architecture:
      Size/MD5 checksum:    44522 7f7420ee316712a6c8fdb84ad38c3423
      Size/MD5 checksum:    66702 101b0a737c55fd410b004183e7d40cd5
      Size/MD5 checksum:    33584 e52f4cec67c9857cc495271bc3b41b66

  Intel IA-64 architecture:
      Size/MD5 checksum:    59118 9fe256ee1e7df20f0e9fb1b7e703c39d
      Size/MD5 checksum:    93468 659c7cca40d3af68caa1763e09346518
      Size/MD5 checksum:    41600 07dfa5bccb3398586771c3ad59cdfdda

  HP Precision architecture:
      Size/MD5 checksum:    50050 8e4f64ec9e32a6cb911ebe80ee3b3a8f
      Size/MD5 checksum:    75046 a5ad5228b08feb37f8cdf2550b45af01
      Size/MD5 checksum:    36878 5f4742217e7755bab6a004995c0722f3

  Motorola 680x0 architecture:
      Size/MD5 checksum:    43686 90559b02e9b9984d971355068fbc2d6c
      Size/MD5 checksum:    64354 0ac16c01b567116927527f21552c187a
      Size/MD5 checksum:    33302 d7e808ebf28a8825ee7e208dac71328c

  Big endian MIPS architecture:
      Size/MD5 checksum:    47664 69f1a8ba05ecb0464d4c7ed2e61e9532
      Size/MD5 checksum:    74858 f7ca8e3b86290eb46c607b7148fcc5a0
      Size/MD5 checksum:    35798 9735fe0cca23043317622a5cf3bc29cd

  Little endian MIPS architecture:
      Size/MD5 checksum:    47830 9de4abc7f659345aff33d2dd4a4b344f
      Size/MD5 checksum:    74918 2d20c2421b7108b767dcc500da0735a0
      Size/MD5 checksum:    35730 efde5bc0a8395d54ad5bfe7f41a3a4a4

  PowerPC architecture:
      Size/MD5 checksum:    45964 1169d5e000ce060eb93814eac3a37f4f
      Size/MD5 checksum:    69066 81a6c1defb8c99555bbe6e4448175be4
      Size/MD5 checksum:    34536 23638627fbed5fa65351906c21da83ba

  IBM S/390 architecture:
      Size/MD5 checksum:    46148 b9f22c5ba045f822f7c32e63266c939c
      Size/MD5 checksum:    70118 19bf493ac9b9481dc9aa39b670c73ed2
      Size/MD5 checksum:    34662 7b2570d55a49a79cc54d4b613d38ef94

  Sun Sparc architecture:
      Size/MD5 checksum:    52116 a44018d8bfd17f534fc53f83fd8cafd0
      Size/MD5 checksum:    76376 89f60dd027bf843aace78e0ddfe22ec3
      Size/MD5 checksum:    37054 490c89a13f6f68715f619069f5a7a5ce

  These files will probably be moved into the stable distribution on
  its next update.

For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show ' and

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.